Nuclear Security Regulations: SOR/2025-219

Canada Gazette, Part II, Volume 159, Number 24

Registration
SOR/2025-219 October 30, 2025

NUCLEAR SAFETY AND CONTROL ACT

P.C. 2025-743 October 30, 2025

The Canadian Nuclear Safety Commission makes the annexed Nuclear Security Regulations under subsection 44(1)footnote a of the Nuclear Safety and Control Act footnote b.

Ottawa, June 26, 2025

Pierre Tremblay
President of the Canadian Nuclear Safety Commission

Her Excellency the Governor General in Council, on the recommendation of the Minister of Natural Resources, under subsection 44(1)footnote a of the Nuclear Safety and Control Act footnote b, approves the annexed Nuclear Security Regulations made by the Canadian Nuclear Safety Commission.

Nuclear Security Regulations

Definitions

Definitions

1 The following definitions apply in these Regulations.

Act
means the Nuclear Safety and Control Act. (Loi)
business day
means a day that is not a Saturday or a holiday. (jour ouvrable)
Category I nuclear material
means a nuclear substance listed in column 1 of the schedule that is in the form set out in column 2 and the quantity set out in column 3. (matière nucléaire de catégorie I)
Category II nuclear material
means a nuclear substance listed in column 1 of the schedule that is in the form set out in column 2 and the quantity set out in column 4. (matière nucléaire de catégorie II)
Category III nuclear material
means a nuclear substance listed in column 1 of the schedule that is in the form set out in column 2 and the quantity set out in column 5. (matière nucléaire de catégorie III)
central alarm station operator
means a person who holds an authorization referred to in subsection 57(1). (opĂ©rateur du poste central d’alarme)
critical security measure
means any equipment, process or system the continuous operation of which is necessary to ensure that an effective intervention can be made. (mesure de sécurité essentielle)
design basis threat
means all of the threats that are identified in respect of high-security sites by the Commission under subsection 28(1). (menace de rĂ©fĂ©rence)
direct visual surveillance
means direct and continuous observation of a person or place by a person who is
  • (a) physically present where the person is located or at the place that is under observation; or
  • (b) remotely observing that person or place. (surveillance visuelle directe)
Directive on Security Screening
means the document entitled Directive on Security Screening, published by the Treasury Board Secretariat, as amended from time to time. (Directive sur le filtrage de sécurité)
D-value
means, in respect of a nuclear substance, the D-value set out for that substance in Table 1 to section 2 of the document entitled Dangerous quantities of radioactive material (D-values), published by the International Atomic Energy Agency, as amended from time to time. (valeur D)
effective intervention
means an intervention that is timely and powerful enough to prevent the unauthorized removal of nuclear substances from a nuclear facility and
  • (a) in respect of an area within a high-security site where the results of sabotage would be to endanger the health or safety of persons, to prevent sabotage; and
  • (b) in respect of an area within a high-security site where the results of sabotage would be to impact the health or safety of persons, to prevent or mitigate sabotage. (dĂ©fense efficace)
enhanced security clearance
means a clearance referred to in subsection 45(1). (cote de sĂ©curitĂ© approfondie)
explosive substance
has the same meaning as in section 2 of the Criminal Code. (substance explosive)
facility-access security clearance
means a clearance granted by a licensee, as defined in section 83, that allows a person to enter and remain in a nuclear facility referred to in paragraph 3(c). (cote de sĂ©curitĂ© donnant accès Ă  l’installation)
firearm
has the same meaning as in section 2 of the Criminal Code. (arme Ă  feu)
high-security site
means a nuclear facility at which Category I nuclear material or Category II nuclear material is produced, processed, used or stored. (site à sécurité élevée)
high-security site access clearance
means a clearance granted by a licensee, as defined in section 25, that allows a person to enter and remain in a protected area at a high-security site. (cote donnant accès au site Ă  sĂ©curitĂ© Ă©levĂ©e)
inner area
means an area that is within a protected area and is for the processing, production, use or storage of Category I nuclear material. (zone intérieure)
inspector
means a person who is designated as an inspector under section 29 of the Act. (inspecteur)
limited access area
means a clearly demarcated area of a nuclear facility that is outside of a protected area and to which the licensee, as defined in section 25, controls access. (zone Ă  accès limitĂ©)
nuclear security event
means an event that has potential or actual implications for nuclear security and that necessitates a response. (événement de sécurité nucléaire)
nuclear security measure
means a physical security or cyber security measure that is intended to deter, detect, delay or respond to a threat to a nuclear facility, a nuclear substance or the confidentiality, integrity or availability of sensitive information. (mesure de sécurité nucléaire)
nuclear security officer
means a person who holds an authorization referred to in subsection 55(1). (agent de sĂ©curitĂ© nuclĂ©aire)
nuclear security support person
means a person, other than a nuclear security officer or central alarm station operator, whose duties in relation to a high-security site include any of the following:
  • (a) the design, installation, maintenance or repair of a nuclear security system or a nuclear security measure;
  • (b) the control, maintenance or repair of firearms and related equipment;
  • (c) the control, maintenance or repair of access control systems;
  • (d) the assessment, denial, revocation or granting of authorizations or clearances;
  • (e) the monitoring of threats that may affect the site; and
  • (f) training related to any of the activities referred to in paragraphs (a) to (e). (prĂ©posĂ© Ă  la sĂ©curitĂ© nuclĂ©aire)
nuclear security system
means an integrated set of nuclear security measures at a nuclear facility. (système de sécurité nucléaire)
off-site response force
means a force that is not stationed at a nuclear facility and that is composed of
  • (a) members of a local, regional, provincial or federal police force;
  • (b) members of a Canadian Armed Forces unit;
  • (c) members, other than those referred to in either paragraph (a) or (b), who
    • (i) in the case of a high-security site, are capable of making an effective intervention at the site, taking into account the design basis threat and any other threat identified in the threat and risk assessment, and
    • (ii) in the case of any other nuclear facility, are capable of making an effective intervention at the nuclear facility, taking into account the threats identified in the threat and risk assessment; or
  • (d) any combination of the members referred to in paragraphs (a) to (c). (force d’intervention externe)
on-site nuclear response force
means
  • (a) a team of nuclear security officers who are permanently stationed at a high-security site; or
  • (b) the members of a local, regional, provincial or federal police force or a Canadian Armed Forces unit, or any combination of those members, whose services the licensee, as defined in section 2, has retained and who are permanently stationed at a high-security site. (force d’intervention nuclĂ©aire interne)
physical barrier
means a fence, wall or similar impediment that controls access to the area that it encloses and delays unauthorized access to that area. (barrière physique)
protected area
means an area that is within a high-security site and is for the production, processing, use or storage of Category I nuclear material or Category II nuclear material. (zone protĂ©gĂ©e)
sabotage
means any deliberate act that
  • (a) is directed against a nuclear facility or Category I nuclear material, Category II nuclear material or Category III nuclear material that is in use, storage or transport; and
  • (b) could directly or indirectly impact the environment or the health or safety of persons as a result of exposure to radiation or the release of a nuclear substance. (sabotage)
security exercise
means a test of the elements of a contingency plan and nuclear security measures and, in the case of a security exercise referred to in subsection 101(1), a test of multiple nuclear security measures. (exercice de sĂ©curitĂ©)
security guard
means a person who carries out duties related to the security of a nuclear facility referred to in paragraph 3(c), such as direct visual surveillance of the facility and the protection of persons and property. (garde de sĂ©curitĂ©)
security personnel
means the nuclear security officers, nuclear security support persons and central alarm station operators of a nuclear facility and their supervisors. (personnel de sécurité)
sensitive information
means information, including the information referred to in section 21 of the General Nuclear Safety and Control Regulations, in any form, including software, whose unauthorized disclosure, modification or destruction or to which denial of access could compromise nuclear security. (renseignements de nature dĂ©licate)
threat and risk assessment
means an assessment that
  • (a) identifies sensitive information and the threats to that information;
  • (b) identifies any threat that could
    • (i) compromise the security of a nuclear facility or its operations,
    • (ii) exploit vulnerabilities in a nuclear facility’s nuclear security measures, or
    • (iii) in the case of the transport of Category I nuclear material, Category II nuclear material or Category III nuclear material, compromise the security of sensitive information or the nuclear material; and
  • (c) evaluates the risks posed by those threats and the adequacy and effectiveness of an existing or proposed nuclear security system or nuclear security measure that is designed to protect against those threats. (Ă©valuation de la menace et du risque)
threat item
means
  • (a) an object, other than a match or pocket lighter, that is fabricated with combustible materials and that could be used to inflict burn injuries on persons or cause fire damage to property;
  • (b) a component of a weapon, an explosive device or an object referred to in paragraph (a); and
  • (c) any other item that could pose a threat to the security of a nuclear facility. (article dangereux)
vehicle portal
means a portal for the passage of land vehicles that has enclosed sides, a movable barrier at either end and is large enough to accommodate a land vehicle. (sas pour véhicule)
vital area
means an area that is inside a protected area and that contains equipment, systems, structures, components or nuclear substances the sabotage of which could directly or indirectly impact the environment or the health or safety of persons as a result of exposure to radiation or the release of a nuclear substance. (zone vitale)
weapon
has the same meaning as in section 2 of the Criminal Code. (arme)

PART 1
General Provisions

Definition

Definition of licensee

2 In this Part, licensee means any of the following persons:

Application

Application of Part

3 This Part applies in respect of

Licence Application

Required information

4 An application for a licence in respect of Category I nuclear material, Category II nuclear material or Category III nuclear material or a nuclear facility, other than a transport licence, must contain, in addition to the information required by section 3 of the Nuclear Substances and Radiation Devices Regulations or sections 3 to 8 of the Class I Nuclear Facilities Regulations, as applicable,

Security Requirements

Nuclear Security Plan

Review and update

5 (1) A licensee must review the nuclear security plan at least once per year and update it to reflect any changes to the information that it is required to contain.

Copy to be provided before implementation

(2) The licensee must provide a copy of the updated nuclear security plan to the Commission before it is implemented.

Threat and Risk Assessment

Minimum frequency

6 (1) A licensee must conduct, at least once every five years, a threat and risk assessment specific to each nuclear facility at which they carry on licensed activities.

Review and update

(2) The licensee must

Modifications to nuclear security system

(3) After providing the copy of the updated nuclear security plan under subsection 5(2), the licensee must make the modifications to its nuclear security system that are necessary to counter any vulnerabilities or threats identified in the threat and risk assessment.

Record to be kept

(4) For each threat and risk assessment that is conducted, the licensee must keep a record that sets out the results of that threat and risk assessment and each update under paragraph (2)(b).

Records to be provided

(5) A licensee must provide to the Commission

Effective intervention

7 A licensee must implement nuclear security measures that ensure that an effective intervention can be made, taking into account the threats identified in the threat and risk assessment.

Security Program

Training program — behaviour of personnel

8 A licensee must develop and implement a training program to ensure that its supervisors are trained to recognize and report behaviour of personnel, including contractors, that could pose a threat to security at a nuclear facility at which it carries on licensed activities.

Security culture

9 (1) A licensee must implement measures to promote and support security culture.

Record to be kept

(2) The licensee must keep a record of the security culture measures that it implements.

Interfaces of safety, security and safeguards

10 (1) A licensee must, to the extent possible, ensure that

Process to coordinate measures

(2) The licensee must establish, implement and maintain a process to

Record to be kept

(3) The licensee must keep a record that sets out the process referred to in subsection (2).

Compensatory measures

11 (1) If a critical security measure for a nuclear facility at which a licensee carries on licensed activities becomes degraded, inoperative or compromised, the licensee must immediately implement compensatory measures that are as effective as that measure was before it became degraded, inoperative or compromised.

Records to be kept

(2) A licensee must keep a record that sets out the process for implementing the compensatory measures and a record that sets out each instance in which a compensatory measure is implemented.

Compromise of critical security measure

12 When a licensee becomes aware that a device that is part of a critical security measure is degraded, inoperative or compromised in any way, including by loss, theft or unauthorized transfer, the licensee must

Security guards

13 (1) A licensee must ensure that each security guard at a nuclear facility at which it carries on licensed activities is trained and qualified to carry out their assigned duties.

Record to be kept

(2) The licensee must keep a record of the training that it provides to each security guard and proof that they are qualified to carry out their assigned duties.

Arrangements with off-site response force

14 (1) A licensee must make written arrangements with an off-site response force that, alone or in conjunction with the on-site nuclear response force, if any, is capable of making, at a nuclear facility at which the licensee carries on licensed activities, an effective intervention against any physical threat identified in the threat and risk assessment.

Provisions in arrangements

(2) The written arrangements must provide for

Arrangements signed

(3) The licensee must ensure that the written arrangements are signed by the licensee and a person who is authorized to sign on behalf of the off-site response force.

Alarm-monitoring

15 (1) A licensee must have alarm-monitoring capability or make arrangements with an alarm monitoring service.

Alarm-monitoring service

(2) If the licensee has made arrangements with an alarm-monitoring service, those arrangements must provide for the procedure by which the service will notify the licensee or the off-site response force in the event that an alarm signal is received from the nuclear facility.

Cyber Security and Protection of Information

Cyber security program

16 (1) A licensee must, for each nuclear facility at which it carries on licensed activities, implement and maintain the cyber security program referred to in subparagraph 4(a)(viii).

Protection against cyber security threats

(2) The licensee must protect the computer systems and electronic components of the nuclear facility against the cyber security threats that are identified in the threat and risk assessment.

Protection of sensitive information

17 (1) A licensee must protect the sensitive information that is identified in the threat and risk assessment against the threats that are identified in that assessment.

Nuclear security measures

(2) The licensee must implement nuclear security measures that protect the confidentiality, integrity and availability of the sensitive information referred to in subsection (1) against the threats that are identified in the threat and risk assessment.

Access to sensitive information

(3) The licensee must not permit a person to access sensitive information unless the person requires that access to carry out their duties.

Identity verification, clearance or authorization

18 A licensee must implement measures to protect the following information from loss or theft and unauthorized access, use, disclosure, duplication, alteration or destruction:

Security Obligations Relating to Nuclear Substances

Category I nuclear material

19 A licensee must only produce, process, use or store Category I nuclear material in an inner area.

Category II nuclear material

20 A licensee must only produce, process, use or store Category II nuclear material in a protected area.

Category III nuclear material

21 A licensee must only produce, process, use or store Category III nuclear material in

Other nuclear substances

22 (1) A licensee may only produce, process, use or store a nuclear substance, other than Category I nuclear material, Category II nuclear material or Category III nuclear material, that has an activity that is greater than or equal to 10 times the D-value for that substance in an area within a nuclear facility that is designed and constructed to prevent unauthorized access to the nuclear substance.

Security measures

(2) In respect of the area referred to in subsection (1), the licensee must

Removal of nuclear substances

23 A licensee must ensure that nuclear substances are not removed from a nuclear facility at which it carries on licensed activities except in accordance with a licence.

Detection of unauthorized removal

24 (1) If a licensee detects the unauthorized removal of nuclear substances from a nuclear facility at which it carries on licensed activities, it must

Record to be kept

(2) The licensee must keep a record that sets out the process by which it will ensure that any unauthorized removal of nuclear substances from the facility is dealt with in accordance with subsection (1).

PART 2
High-Security Sites

Definition

Definition of licensee

25 In this Part, licensee means a person who, in relation to a high-security site, is licensed under the Act to carry out any of the following activities:

Application

Application of Part

26 This Part applies in respect of high-security sites.

Licence Application

Additional information and documents

27 The nuclear security plan contained in an application for a licence in respect of a high-security site must contain, in addition to the information and documents required under paragraph 4(a), the following information and documents:

Design Basis Threat

Commission to identify threats

28 (1) The Commission must identify any threat involving a person or group that may have the capability, motivation and intent to attempt

Commission to inform licensee

(2) The Commission must inform each licensee of the design basis threat.

Nuclear security system

29 (1) A licensee must design a nuclear security system taking into account the design basis threat and any other threat identified in the threat and risk assessment, evaluate the ability of the system to respond to those threats and make modifications to the system as necessary.

Nuclear security measures

(2) The licensee must implement nuclear security measures that ensure that an effective intervention can be made, taking into account the design basis threat and any other threat identified in the threat and risk assessment.

Record to be kept

(3) The licensee must keep a record that sets out the processes it has implemented to design and make modifications to the nuclear security system.

Security Requirements

Nuclear Security Officers

Number and duties

30 (1) A licensee must have, at all times, a sufficient number of nuclear security officers available at a high-security site to carry out the following duties:

Record to be kept

(2) The licensee must keep a record that sets out the duties of its nuclear security officers and give a copy of it to each officer.

Provision of equipment

31 A licensee must provide each of its nuclear security officers with the equipment, devices and apparel that are necessary to carry out their duties.

Training, knowledge, skill and qualifications

32 (1) A licensee must ensure that a nuclear security officer does not carry out a duty unless

Continuing training program

(2) The licensee must ensure that each of its nuclear security officers participates in a continuing training program that includes training regarding

Record to be kept

(3) The licensee must keep a record of the training received by each of its nuclear security officers.

Record to be kept — firearms

33 A licensee must keep a record that sets out the following information in respect of each of its nuclear security officers whose duties require them to carry a firearm:

Response Forces

On-site nuclear response force required

34 (1) Subject to subsection (2), a licensee must maintain an on-site nuclear response force that, in combination with the off-site response force and the nuclear security measures for the high-security site, is capable of making an effective intervention, taking into account the design basis threat and any other threat identified in the threat and risk assessment.

Exception

(2) The licensee is not required to maintain an on-site nuclear response force if

Firearms

(3) The licensee must ensure that every nuclear security officer who is a member of its on-site nuclear response force is authorized to carry firearms in Canada and is trained and qualified to use them.

Equipment

(4) The licensee must provide nuclear security officers who are members of the on-site nuclear response force with the equipment, devices and apparel that are necessary to make an effective intervention, taking into account the design basis threat and any other threat identified in the threat and risk assessment.

Arrangements with off-site response force

35 In addition to meeting the requirements of section 14, the written arrangements made between the licensee and the off-site response force in respect of a high-security site must provide for

Contingency Plan

Plan required

36 A licensee must develop and maintain a contingency plan to ensure that an effective intervention can be made, taking into account the design basis threat and any other threat identified in the threat and risk assessment.

Security Drill and Security Exercise Program

Program elements

37 (1) A licensee must implement a security drill and security exercise program that, by means of physical drills, cyber security drills and security exercises, verifies and evaluates

Program updates

(2) The licensee must update the program after each security drill or security exercise if the results of that drill or exercise indicate that an update is necessary.

Security drills

38 (1) A licensee must conduct a security drill at least once every 30 days to test the readiness of its security personnel and the operation of one or more nuclear security measures or one or more elements of the contingency plan.

Participation of nuclear security officers

(2) The licensee must ensure that, at least once in each quarter of a given year, every nuclear security officer whose duties include the implementation of the contingency plan participates in a security drill.

Security exercise

39 (1) A licensee must, in cooperation with the off-site response force, at least once every two years, conduct a security exercise that tests

Notice to Commission

(2) The licensee must notify the Commission in writing of its intent to conduct a security exercise at least four months before the day on which the exercise is to be held.

Records to be kept

40 (1) A licensee must, for each security drill and security exercise that it conducts, keep a record that contains

Records to be provided — security exercise

(2) The licensee must, within 180 days after the day on which a security exercise is completed, provide to the Commission a copy of the record for that exercise.

Corrective action plan

41 (1) If a corrective action referred to in paragraph 40(1)(d) is to be implemented using a phased approach, the licensee must create a corrective action plan that sets out

Implementation

(2) The licensee must implement the corrective actions and, if they are to be implemented using a phased approach, each phase must be completed in accordance with the timetable set out in the corrective action plan.

Corrective action plan to be provided

(3) The licensee must, within 90 days after the day on which the related security drill or security exercise is completed, provide a copy of the corrective action plan, if any, to the Commission.

Central Alarm Station

Central alarm station

42 (1) A licensee must ensure that the nuclear security measures referred to in subparagraphs 61(2)(a)(i) and (ii) and 68(1)(a)(i) and (ii) are monitored from a central alarm station.

Requirements

(2) The central alarm station must be

Entry

(3) The licensee must not permit a person to enter the central alarm station unless they are security personnel or otherwise authorized to enter by the licensee and they require entry to carry out their duties.

Operational readiness

(4) The licensee must implement processes that ensure that the central alarm station maintains operational readiness.

Backup Alarm Station

Station requirements

43 (1) A licensee must establish a backup alarm station that is

Operations

(2) The licensee must ensure that the backup alarm station is operated only by security personnel who have received training on its operation.

Entry

(3) The licensee must not permit a person to enter the backup alarm station unless they are security personnel or otherwise authorized to enter by the licensee and they require entry in order to carry out their duties.

Operational readiness

(4) The licensee must implement processes that ensure that the backup alarm station maintains operational readiness.

Testing

(5) The licensee must test the functions of the backup alarm station at least once every five years.

Clearances and Authorizations

Clearances
High-security Site Access Clearance

Conditions

44 (1) A licensee may grant a high-security site access clearance to a person if

Verification of documents and information

(2) For the purpose of paragraph (1)(a), the licensee must verify the following information and documents in respect of the person who is seeking the high-security site access clearance:

Factors to be considered

(3) For the purpose of making the determination referred to in paragraph (1)(a), the licensee must take the following factors into consideration:

Period and conditions

(4) The high-security site access clearance may be granted for a period of no more than 10 years and must be subject to any terms and conditions that are necessary to minimize the risk to the security of the high-security site.

Record to be kept

(5) A licensee that grants a high-security site clearance under paragraph (1)(b) must keep a record indicating how it verified that the person holds the clearance referred to in that paragraph.

Enhanced Security Clearance

Conditions

45 (1) A licensee may grant an enhanced security clearance to a person if

Verification of information and documents

(2) For the purpose of paragraph (1)(a), the licensee must verify the following information and documents in respect of the person who is seeking the enhanced security clearance:

Period and conditions

(3) An enhanced security clearance may be granted for a period of no more than five years and must be subject to any terms and conditions that are necessary to minimize the risk to the security of the high-security site.

Record

List of persons

46 (1) A licensee must keep an up-to-date list of each person to whom a clearance has been granted under section 44 or 45 and that identifies their clearance.

List to be provided

(2) The licensee must, on request, provide a copy of the list to the Commission or an inspector.

Revocation

Conditions

47 (1) A licensee must revoke a person’s high-security site access clearance or enhanced security clearance if

Commission to be notified

(2) The licensee must notify the Commission in writing of any revocation made under paragraph (1)(a) or (e) within five business days after the day on which the revocation is made.

Authorizations
Exceptions

Inspectors

48 (1) Subsection 49(1) and sections 50 and 51 do not apply to an inspector who is designated to carry out inspections at high-security sites or to a person who is chosen by the inspector to accompany them under section 33 of the Act.

First responders

(2) Despite subsection 49(1) and sections 50 and 51, a member of the off-site response force, a peace officer or a member of an emergency service who requires access to a protected area, vital area or inner area for the purpose of carrying out their duties may enter and remain in the area without having been granted a high-security site access clearance or enhanced security clearance and, in the event of an emergency in that area, without an authorization referred to in paragraph 49(1)(b) or section 52.

Access to Protected Area

Requirements to enter and remain

49 (1) A person must not enter or remain in a protected area unless

Authorization — without escort

(2) The licensee may grant an authorization to a person to enter and remain in a protected area without an escort if

Authorization — with escort

(3) The licensee may grant an authorization to a person to enter and remain in a protected area with an escort if

Period

(4) An authorization referred to in subsection (2) may be granted for a period of no more than 10 years.

Conditions

(5) An authorization granted under subsection (2) or (3) must be subject to any terms and conditions that are necessary to minimize the risk to the security of the high-security site.

Copy of request for information and documents

(6) If requested by the person referred to in subsection (1), the licensee must provide them with a copy of all information and documents relating to the authorization that are in the licensee’s possession and that were provided to the licensee by or on behalf of that person.

Access to Vital Area and Inner Area

Vital area

50 A person must not enter or remain in a vital area unless the licensee has granted the person an authorization for the area under subsection 52(1) or (2) and, if the authorization is one referred to in subsection 52(2), the person is escorted in accordance with that authorization.

Inner area

51 A person must not enter or remain in an inner area unless

Authorization — without escort

52 (1) A licensee may grant an authorization to a person to enter and remain without an escort in a vital area or inner area, as the case may be, if

Authorization — with escort

(2) The licensee may grant an authorization to a person to enter and remain with an escort in a vital area or inner area, as the case may be, if

Period

(3) An authorization referred to in subsection (1) may be granted for a period of no more than five years.

Conditions

(4) An authorization granted under subsection (1) or (2) must be subject to any terms and conditions that are necessary to minimize the risk to the security of the high-security site.

Copy of information and documents

(5) If requested by the person referred to in subsection (2), the licensee must provide them with a copy of all information and documents relating to the authorization that are in the licensee’s possession and that were provided to the licensee by or on behalf of that person.

Records

Record to be kept

53 (1) A licensee must, for each person to whom an authorization has been granted under section 49 or 52, keep a record that sets out their name, their authorization and the day on which their authorization ends.

Retention of record

(2) The record must be retained until one year after the day on which the person’s authorization ends or is revoked.

Record to be provided

(3) The licensee must, on request, provide a copy of the record to the Commission or an inspector.

Record to be made available

(4) The licensee must make a copy of the record available to its nuclear security officers.

Security Personnel

Clearance required

54 A licensee must not permit an employee, or any other person who is under contract to the licensee, to carry out the duties of security personnel or those related to nuclear security intelligence unless it has granted the person an enhanced security clearance.

Nuclear Security Officers

Written authorization

55 (1) A person must not act as a nuclear security officer unless the licensee grants them written authorization to do so.

Requirements for authorization

(2) Before granting the authorization, the licensee must

Assessment by licensee

(3) Before granting the authorization to a person, the licensee must assess the person’s knowledge of the security procedures and nuclear security measures that are relevant to their duties and their ability to carry them out.

Period and conditions

(4) The authorization may be granted for a period of no more than five years and must be subject to any terms and conditions that are necessary to minimize the risk to the security of the high-security site.

Copy of information and documents

(5) If requested by the person referred to in subsection (2), the licensee must provide them with a copy of all information and documents relating to the authorization that are in the licensee’s possession and that were provided to the licensee by or on behalf of that person.

Nuclear Security Support Person

Written authorization

56 (1) A person must not act as a nuclear security support person unless the licensee has granted the person written authorization to do so and, if the authorization is one referred to in subsection (3), they are escorted in accordance with subsection (4).

Authorization — without escort

(2) The licensee may grant an authorization to a person to act as a nuclear security support person without an escort if it has granted the person an enhanced security clearance for the high-security site.

Authorization — with escort

(3) The licensee may grant an authorization to a person to act as a nuclear security support person with an escort if it has obtained the following information and documents in respect of the person:

Conditions — escort required

(4) An authorization granted under subsection (3) must be made subject to the following conditions:

Period

(5) An authorization referred to in subsection (2) may be granted for a period of no more than five years.

Conditions

(6) An authorization granted under subsection (2) or (3) must be subject to any terms and conditions that are necessary to minimize the risk to the security of the high-security site.

Copy of information and documents

(7) If requested by the person referred to in subsection (2), the licensee must provide them with a copy of all information and documents relating to the authorization that are in the licensee’s possession and that were provided to the licensee by or on behalf of that person.

Central Alarm Station Operator

Written authorization

57 (1) A person must not act as a central alarm station operator unless the licensee grants them written authorization to do so.

Requirements for authorization

(2) Before granting the authorization, the licensee must

Period and conditions

(3) The authorization may be granted for a period of no more than five years and must be subject to any terms and conditions that are necessary to minimize the risk to the security of the high-security site.

Copy of information and documents

(4) If requested by the person referred to in subsection (2), the licensee must provide them with a copy of all information and documents relating to the authorization that are in the licensee’s possession and that were provided to the licensee by or on behalf of that person.

Record

List of persons

58 (1) A licensee must keep an up-to-date list of each person to whom an authorization has been granted under section 55, 56 or 57 and that identifies the authorization.

List to be provided

(2) The licensee must, on request, provide a copy of the list to the Commission or an inspector.

Revocation

Conditions

59 (1) A licensee must revoke an authorization granted to a person under this Part if

Commission to be notified

(2) The licensee must notify the Commission in writing of any revocation made under paragraph (1)(a) or (e) within five business days after the day on which the revocation is made.

Nuclear Security Measures

Power Supply

Uninterrupted power supply

60 A high-security site must be equipped with devices that, in the event of the loss of the power supply, maintain an uninterrupted power supply for a period of time that is sufficient to allow for an alternate continuous power supply to be implemented for all critical security measures that require a power supply and that are described in the nuclear security plan.

Protected Area

Perimeter enclosed by physical barrier

61 (1) A protected area must be enclosed by a physical barrier that is located at its perimeter.

Other nuclear security measures

(2) The perimeter of the protected area must be

Design, construction and implementation

(3) The physical barrier must be designed and constructed and the other nuclear security measures must be designed and implemented such that together they

Security facilities

(4) Permanent security facilities such as guard posts and vehicle portals may join with the physical barrier if a continuous barrier is maintained.

Means of entry or exit

(5) Each gate, door, window or other means of entry or exit in the physical barrier must be

Unobstructed areas

62 (1) Both sides of the physical barrier referred to in subsection 61(1) must be bordered by an unobstructed area that is free from any structures, equipment or other obstructions and is large enough to allow for the unrestricted observation of the movement of any person or object within the area.

Lighting

(2) An unobstructed area must be continuously and uniformly illuminated at an intensity that allows the presence of any person or object within the area to be clearly observed and assessed.

Vehicle and vessel barriers

63 The perimeter of a protected area must be protected by a nuclear security measure that is designed to protect against the forced entry of land vehicles — and, if the protected area is adjacent to a body of water, vessels — into the protected area.

Vital Areas

Identification process

64 A licensee must establish a process to identify vital areas and keep a record that sets out that process.

Nuclear security measures

65 (1) A vital area must be protected by nuclear security measures that

Means of entry or exit

(2) Each gate, door, window or other means of entry or exit in a vital area must be securely locked when it is unattended.

List of persons

66 A licensee must keep an up-to-date list of all persons who have access to keys, keycards or any other system, including a computer system, that controls access to a vital area.

Inner Area

Enclosed structure

67 (1) An inner area must be within an enclosed structure that is

Means of entry or exit

(2) Each gate, door, window or other means of entry or exit in the enclosed structure must be kept closed and securely locked with a device that can only be unlocked from outside the structure by two persons who are authorized under subsection 52(1), with each of them simultaneously using a means of access control.

Nuclear security measures

68 (1) An inner area must be

Access control

(2) An inner area must be protected by nuclear security measures that

Access Control

Prohibitions

Unauthorized persons

69 (1) A licensee must not permit an unauthorized person to enter or remain in

Access without required escort

(2) The licensee must not permit a person who has been granted an authorization to enter or remain in a protected area, vital area or inner area with escort to enter or remain in that area unless they are escorted in accordance with that authorization.

Reporting unauthorized person

70 If a person observes anyone in a protected area, vital area or inner area whom they believe on reasonable grounds is not authorized to be in that area, they must immediately report that fact to a nuclear security officer.

Weapons, explosive substances and threat items

71 A licensee must ensure that

Removal of nuclear material

72 (1) A licensee must ensure that Category I nuclear material, Category II nuclear material or Category III nuclear material is not removed from a protected area or inner area except in accordance with a licence.

Vital area

(2) A licensee must ensure that Category I nuclear material, Category II nuclear material or Category III nuclear material is not removed from a vital area without its authorization.

Prohibited activities

73 A person must not

Identity Verification

Protected area

74 Before a person who has been granted an authorization under section 49 enters a protected area, the licensee must verify their identity by two separate personnel identity verification systems, one of which must use biometric information.

Vital area

75 The licensee must verify and record the identity of every person who enters a vital area.

Vehicle Access

Land vehicles

76 A licensee must not permit a land vehicle to enter a protected area, vital area or inner area unless there is an operational requirement for it to be in that area.

Vehicle access

77 (1) A licensee must ensure that land vehicles only enter into or exit from a protected area through a vehicle portal or, if necessary for an operational requirement, through an opening with two moveable barriers.

Both barriers not to be open

(2) Both moveable barriers of a vehicle portal or opening must not be open at the same time except in the event of an emergency or if it is necessary to do so for an operational requirement.

When both barriers are open

(3) When both moveable barriers of a vehicle portal or opening are open at the same time, the vehicle portal or opening, as the case may be, must be

Inner Area Access

Means of entry or exit

78 (1) A licensee must not permit a gate, door, window or other means of entry or exit in the structure that encloses an inner area to be unlocked, opened or kept open except for the period of time necessary to allow for the passage of persons or items into or out of the area or for the completion of an operational requirement.

Direct visual surveillance

(2) While the means of entry or exit is unlocked, opened or kept open, the licensee must ensure that it is under the direct visual surveillance of a nuclear security officer who is dedicated exclusively to that task.

Unlocked from outside

(3) A licensee must not permit a gate, door, window or other means of entry or exit in the structure that encloses an inner area to be unlocked from the outside unless it is unlocked by two persons who are authorized to enter the inner area, at least one of whom is a nuclear security officer.

Person must be accompanied

79 A person who is authorized under subsection 52(1) to enter and remain in an inner area must not enter the area unless they are accompanied by another person who is authorized to do so under that subsection and they remain in visual contact with that other person.

Searches

Signage for high-security site

80 (1) A licensee must post, in close proximity to the location at which the search of persons is conducted, signage that is visible to any person who is about to enter a high-security site that states, in English and French, that all persons entering and exiting the site and everything in their possession, including any land vehicle, are

Signage for protected area and inner area

(2) A licensee must post, in close proximity to the location at which the search of persons is conducted, signage that is visible to any person who is about to enter a protected area or inner area that states, in English and French, that all persons entering and exiting the area and everything in their possession, including any land vehicle, are

Search on entry

81 (1) Subject to subsection (3), a licensee must not permit any person to enter a protected area or inner area unless the person and everything in their possession, including any land vehicle, are searched by a nuclear security officer — using any necessary detection and screening devices — for weapons, explosive substances, threat items and, in the case of a land vehicle, unauthorized persons.

Search on exit

(2) Subject to subsection (3), a licensee must ensure that all persons exiting a protected area or inner area and everything in their possession, including any land vehicle, are searched by a nuclear safety officer for Category I nuclear material, Category II nuclear material and Category III nuclear material using devices capable of detecting that material.

Exceptions

(3) The following persons are not subject to a search under subsection (1) or (2):

Search after entry

(4) If the licensee has reasonable grounds to suspect that a person who is in a protected area or inner area has any of the following items in their possession, the licensee must not permit the person to remain in that area unless the person and everything in their possession, including a land vehicle, is searched for those items:

Conduct of search

(5) A search of a person that is conducted under this section must be

Search of land vehicle

(6) If the high-security site is equipped with a vehicle portal, a search of a land vehicle that is conducted under this section must take place in the vehicle portal.

Prohibition

82 A person who refuses to submit to a search to which they are subject under section 81 must not enter a protected area or inner area.

PART 3
Other Nuclear Facilities

Definition

Definition of licensee

83 In this Part, licensee means a person who, in relation to a nuclear facility referred to in paragraph 3(c) of these Regulations, is licensed under the Act to

Application

Application of Part

84 This Part applies in respect of the nuclear facilities referred to in paragraph 3(c).

Facility-access Security Clearance

Conditions

85 (1) A licensee may grant a facility-access security clearance to a person if

Verification of information and documents

(2) For the purpose of paragraph (1)(a), the licensee must verify the following information and documents in respect of the person who is seeking the facility-access security clearance:

Period and conditions

(3) A facility-access security clearance may be granted for a term not exceeding 10 years and must be subject to any terms and conditions that are necessary to minimize the risk to the security of the nuclear facility.

Record and notice

(4) A licensee that grants a facility-access security clearance under paragraph (1)(b) must keep a record indicating how it verified that the person holds a status or clearance, as the case may be, referred to in that paragraph.

List of persons

86 (1) A licensee must keep an up-to-date list of the persons to whom a facility-access security clearance has been granted.

List to be provided

(2) The licensee must, on request, provide a copy of the list to the Commission or an inspector.

Revocation

87 (1) A licensee must revoke a person’s facility-access security clearance if

Commission to be notified

(2) The licensee must notify the Commission in writing of any revocation made under paragraph (1)(a) or (e) within five business days after the day on which the revocation is made.

Access Control

Access to Nuclear Facility

Entering or remaining in nuclear facility

88 (1) A person must not enter or remain in a nuclear facility at which a licensee carries out licensed activities unless they

Escort not required

(2) Despite paragraph (1)(b), a member of the off-site response force, a peace officer or a member of an emergency service is not required to be escorted if there is an emergency at the facility and they require access to it for the purpose of carrying out their duties.

Licensee’s obligation

89 (1) A licensee must ensure that every person who enters or remains in a nuclear facility at which it carries on licensed activities is permitted to do so under subsection 88(1).

Identity verification

(2) The licensee must establish and implement a process that controls access to the nuclear facility and that ensures that the identity of each person who enters the facility, other than one referred to in paragraph 88(1)(c), is verified by,

Weapons, explosive substances and threat items

90 A licensee must ensure that

Prohibited activities

91 A person must not

Entry of land vehicles

92 (1) A licensee must not permit a land vehicle to enter a nuclear facility at which the licensee carries on a licensed activity unless

Exception

(2) Despite paragraph (1)(a), a vehicle that is used by a security guard, a member of the off-site response force, a peace officer or a member of an emergency service is not required to be searched if there is an emergency at the nuclear facility and the use of the vehicle is necessary to carry out their duties.

Searches and Screening

Signage

93 A licensee must post, in close proximity to the location at which the search and screening of persons is conducted, signage that is visible to any person who is about to enter the nuclear facility that states, in English and French, that

Processes for search or screening

94 (1) A licensee must implement processes that, using a risk-based approach, provide for the manner of selecting the persons who are to be searched or screened, respectively,

Entry search or screening

(2) The licensee must not permit any person who is selected for search or screening to enter the nuclear facility unless the person and everything in their possession, including any land vehicle, is searched or screened.

Conduct of search or screening

95 A search or screening referred to in section 94 must be carried out by a person who is authorized to do so by the licensee and must be

Security Exercise

Security exercise

96 (1) A licensee must, in cooperation with the off-site response force, at least once every five years, conduct a security exercise that tests

Notice to Commission

(2) The licensee must notify the Commission in writing of its intent to conduct a security exercise at least four months before the day on which the exercise is to be held.

Record to be kept

(3) The licensee must, for each security exercise that it conducts, keep a record that contains

Corrective action plan

(4) If a corrective action referred to in paragraph (3)(c) is to be implemented using a phased approach, the licensee must create a corrective action plan that sets out

Corrective actions

(5) The licensee must implement the corrective actions and, if they are to be implemented using a phased approach, each phase must be completed in accordance with the timetable set out in the corrective action plan.

Records to be provided

(6) The licensee must, within 90 days after the day on which the security exercise is completed, provide to the Commission a copy of the record referred to in subsection (3) and, if any, a copy of the corrective action plan referred to in subsection (4).

PART 4
Licence to Transport

Definition of licensee

97 In this Part, licensee means a person who is licensed to transport Category I nuclear material, Category II nuclear material or Category III nuclear material.

Application

98 This Part applies in respect of the transport of Category I nuclear material, Category II nuclear material or Category III nuclear material.

Exemption

99 (1) A person may, without a licence to carry on that activity, transport Category I nuclear material, Category II nuclear material or Category III nuclear material within an area in which the material is required by sections 19 to 21 to be produced, processed, used or stored.

Section 26 of Act

(2) For greater certainty, the exemption established under subsection (1) relates only to the activity specified in that subsection and does affect the licence requirement imposed by section 26 of the Act in relation to other activities.

Transport security plan

100 An application for a licence to transport Category I nuclear material, Category II nuclear material or Category III nuclear material must contain, in addition to the information required under section 7 of the Packaging and Transport of Nuclear Substances Regulations, 2015, a transport security plan that includes

Security exercise

101 (1) The licensee must conduct a security exercise in respect of the transport of Category I nuclear material, Category II nuclear material and Category III nuclear material at least once every five years.

Record to be kept

(2) The licensee must, for each security exercise that it conducts, keep a record that contains

Corrective action plan

(3) If a corrective action referred to in paragraph (2)(c) is to be implemented using a phased approach, the licensee must create a corrective action plan that sets out

Corrective actions

(4) The licensee must implement the corrective actions and, if they are to be implemented using a phased approach, each phase must be completed in accordance with the timetable set out in the corrective action plan.

Records to be provided

(5) The licensee must, within 90 days after the day on which the security exercise is completed, provide to the Commission a copy of the record referred to in subsection (2) and, if any, a copy of the corrective action plan referred to in subsection (3).

PART 5
Consequential Amendments, Transitional Provisions, Repeal and Coming into Force

Consequential Amendments

Class I Nuclear Facilities Regulations

102 Paragraph 3(i) of the Class I Nuclear Facilities Regulations footnote 1 is replaced by the following:

Nuclear Substances and Radiation Devices Regulations

103 Subparagraph 3(1)(n)(ii) of the Nuclear Substances and Radiation Devices Regulations footnote 2 is replaced by the following:

Administrative Monetary Penalties Regulations (Canadian Nuclear Safety Commission)

104 Part 9 of the schedule to the Administrative Monetary Penalties Regulations (Canadian Nuclear Safety Commission) footnote 3 is replaced by the following:

PART 9

Nuclear Security Regulations
Item

Column 1

Provision

Column 2

Short-form Description

Column 3

Category

1 5(1) Failure to review and update nuclear security plan at the specified interval B
2 5(2) Failure to provide copy of updated nuclear security plan to Commission before implementation B
3 6(1) Failure to conduct threat and risk assessment at the specified interval B
4 6(2)(a) Failure to review threat and risk assessment as required B
5 6(2)(b) Failure to update threat and risk assessment as required B
6 6(2)(c) Failure to update nuclear security plan as required B
7 6(3) Failure to make necessary modifications to the nuclear security system B
8 6(4) Failure to keep record of results and updates of each threat and risk assessment A
9 6(5)(a) Failure to provide records to Commission on request B
10 6(5)(b) Failure to provide record of results of threat and risk assessment or an update to Commission within prescribed time B
11 7 Failure to implement nuclear security measures that ensure effective intervention can be made B
12 8 Failure to develop and implement training program B
13 9(1) Failure to implement measures to promote and support security culture B
14 9(2) Failure to keep record of measures implemented to promote and support security culture A
15 10(1) Failure to ensure that measures and activities are designed and implemented as required and ensure that measures do not compromise the environment, the health or safety of persons or the security of the nuclear facility B
16 10(2) Failure to establish, implement and maintain required process regarding conflict and coordination of nuclear security measures B
17 10(3) Failure to keep record setting out the process regarding conflict and coordination of nuclear security measures A
18 11(1) Failure to immediately implement required compensatory measures when critical security measure is degraded, inoperative or compromised B
19 11(2) Failure to keep record setting out process for implementing compensatory measures and record indicating implementation of compensatory measures A
20 12(a) Failure to replace or restore functioning of degraded, inoperative or compromised device as soon as feasible A
21 12(b) Failure to determine how device became degraded, inoperative or compromised A
22 13(1) Failure to ensure security guards are trained and qualified B
23 13(2) Failure to keep record of security guard training and proof of their qualifications A
24 14(1) Failure to make written arrangements with off-site response force that, alone on in conjunction with on-site nuclear response force, is capable of making an effective intervention B
25 14(2) Failure to provide for specified matters in written arrangements with off-site response force B
26 14(3) Failure to have written arrangements signed as required A
27 15(1) Failure to have alarm-monitoring capability or make arrangements with an alarm-monitoring service B
28 15(2) Failure to provide for notification procedure
in arrangements with
alarm-monitoring service
B
29 16(1) Failure to implement and maintain cyber security program C
30 16(2) Failure to protect computer systems and electronic components against cyber security threats as required B
31 17(1) Failure to protect specified sensitive information as required B
32 17(2) Failure to implement nuclear security measures to protect the confidentiality, integrity and availability of specified sensitive information as required B
33 17(3) Permitting person to access sensitive information who does not require access to carry out their duties B
34 18 Failure to implement measures to protect, as required, information for identity verification or in relation to a clearance or authorization B
35 19 Producing, processing, using or storing Category I nuclear material in place other than inner area C
36 20 Producing, processing, using or storing Category II nuclear material in place other than protected area C
37 21 Producing, processing, using or storing Category III nuclear material in place other than protected area or any other area that meets prescribed requirements B
38 22(1) Producing, processing, using or storing specified nuclear substance in place other than area that meets prescribed requirements B
39 22(2)(a) Failure to maintain list of persons who are authorized to access the area B
40 22(2)(b) Permitting unauthorized persons to access the area B
41 22(2)(c) Failure to implement required measures B
42 23 Failure to ensure nuclear substance is not removed from nuclear facility except in accordance with licence B
43 24(1)(a) Failure to determine reason for unauthorized removal of nuclear substance from nuclear facility A
44 24(1)(b) Failure to assess and immediately respond to unauthorized removal of nuclear substance B
45 24(2) Failure to keep record setting out process respecting unauthorized removal of nuclear substances A
46 29(1) Failure to design nuclear security system taking into account the specified threats, evaluate that system or modify the system as necessary B
47 29(2) Failure to implement nuclear security measures that ensure effective intervention can be made, taking into account the specified threats B
48 29(3) Failure to keep record that sets out required processes A
49 30(1) Failure to provide sufficient number of nuclear security officers to carry out the specified duties C
50 30(2) Failure to keep record of nuclear security officers’ duties and to give copy of it to nuclear security officer A
51 31 Failure to provide each nuclear security officer with necessary equipment, devices and apparel B
52 32(1) Failure to ensure nuclear security officer only carries out duties for which they have the necessary training, knowledge and skill and for which they are qualified B
53 32(2) Failure to ensure each nuclear security officer participates in continuing training program that includes the specified training B
54 32(3) Failure to keep record of training received by each nuclear security officer B
55 33 Failure to keep records containing required information regarding nuclear security officers who are required to carry a firearm A
56 34(1) Failure to maintain on-site nuclear response force with required capability C
57 34(3) Failure to ensure that nuclear security officers who are members of on-site nuclear response force are authorized to carry firearms in Canada and trained and qualified to use them C
58 34(4) Failure to provide nuclear security officers who are members of on-site nuclear response force with necessary equipment, devices and apparel C
59 35 Failure to provide for specified matters in the written in arrangements with off-site response force B
60 36 Failure to develop and maintain contingency plan to ensure effective intervention can be made, taking into account the specified threats B
61 37(1) Failure to implement required security drill and security exercise program B
62 37(2) Failure to update the security drill and security exercise program as required B
63 38(1) Failure to conduct security drill at the specified interval B
64 38(2) Failure to ensure that specified nuclear security officers participate in a security drill at the specified interval B
65 39(1) Failure to conduct security exercise as required at the specified interval B
66 39(2) Failure to notify Commission in writing within prescribed time of intent to conduct security exercise B
67 40(1) Failure to keep record containing the required information regarding each security drill and security exercise B
68 40(2) Failure to provide copy of required record to Commission within prescribed time B
69 41(1) Failure to create required corrective action plan setting out the required information B
70 41(2) Failure to implement corrective actions as required B
71 41(3) Failure to provide copy of corrective action plan to Commission within the prescribed period A
72 42(1) Failure to ensure that specified nuclear security measures are monitored from a central alarm station B
73 42(2)(a) Central alarm station not located outside of a vital area or inner area B
74 42(2)(b) Central alarm station not designed, constructed and located as required B
75 42(2)(c) Central alarm station not attended at all times by at least one central alarm station operator B
76 42(2)(d) Central alarm station not designed to prevent solitary central alarm station operator from tampering with or, compromising nuclear security measure or disabling it without authorization B
77 42(2)(e) Central alarm station not equipped as required with respect to alarms received in the station B
78 42(2)(f) Central alarm station not equipped with required devices B
79 42(3) Permitting person to enter central alarm station who does not need to enter to perform their duties B
80 42(4) Failure to implement specified processes B
81 43(1)(a) Failure to establish backup alarm station that is independent from the central alarm station B
82 43(1)(b) Failure to establish backup alarm station that is designed and equipped as required B
83 43(2) Failure to ensure backup alarm station operated only by security personnel with required training B
84 43(3) Permitting person to enter backup alarm station who does not need to enter to perform their duties B
85 43(4) Failure to implement required processes B
86 43(5) Failure to test backup alarm station at specified interval B
87 44(1) Granting high-security site access clearance without meeting prescribed conditions C
88 44(4) Granting high-security site access clearance for term exceeding 10 years or not subject to necessary terms and conditions B
89 44(5) Failure to keep record indicating how clearance was verified A
90 45(1) Granting enhanced security clearance without meeting prescribed conditions C
91 45(3) Granting enhanced security clearance for term exceeding five years or not subject to necessary terms and conditions B
92 46(1) Failure to keep up-to-date list of each person granted a clearance and that identifies their clearance B
93 46(2) Failure to provide copy of list to Commission or inspector on request B
94 47(1)(a) Failure to revoke high-security site access clearance or enhanced security clearance of person who poses or could pose unreasonable risk to health or safety of persons or security of the site B
95 47(1)(b) Failure to revoke high-security site access clearance or enhanced security clearance of person who is no longer employed by or under contract to the licensee B
96 47(1)(c) Failure to revoke high-security site access clearance or enhanced security clearance of person whose duties or functions have been completed, suspended or otherwise terminated B
97 47(1)(d) Failure to revoke high-security site access clearance or enhanced security clearance of person who no longer requires it to perform their duties B
98 47(1)(e) Failure to revoke high-security site access clearance or enhanced security clearance of person who provided false or misleading information B
99 47(2) Failure to notify Commission in writing of revocation of high-security site access clearance or enhanced security clearance as required within prescribed time B
100 49(1) Entering or remaining in protected area without required clearance and authorization and any required escort B
101 49(2) Granting authorization to enter and remain in protected area without escort without meeting prescribed conditions B
102 49(3) Granting authorization to enter and remain in protected area with escort without meeting prescribed conditions B
103 49(4) Granting authorization to enter and remain in protected area without escort for term exceeding 10 years B
104 49(5) Granting authorization to enter and remain in protected area not subject to necessary terms and conditions B
105 49(6) Failure to provide copy of requested information or documents B
106 50 Entering or remaining in vital area without required authorization and any required escort B
107 51 Entering or remaining in inner area without required authorization and being accompanied or escorted as required B
108 52(1) Granting authorization to enter and remain in vital area or inner area without escort without meeting prescribed conditions B
109 52(2) Granting authorization to enter and remain in vital area or inner area with escort without meeting prescribed conditions C
110 52(3) Granting authorization to enter and remain in vital area or inner area without escort for term exceeding five years B
111 52(4) Granting authorization to enter and remain in vital area or inner area not subject to necessary terms and conditions B
112 52(5) Failure to provide copy of requested information or documents B
113 53(1) Failure to keep record that sets out required information for each person who is authorized to enter protected area, vital area or inner area B
114 53(2) Failure to retain record for specified period B
115 53(3) Failure to provide copy of record to Commission or inspector on request B
116 53(4) Failure to make copy of record available to nuclear security officers B
117 54 Permitting person who does not have enhanced security clearance to carry out duties or responsibilities of security personnel or related to nuclear security intelligence B
118 55(1) Acting as nuclear security officer without written authorization of licensee B
119 55(2) Granting authorization to act as nuclear security officer without meeting prescribed conditions B
120 55(3) Granting authorization to act as nuclear security officer without assessing person’s knowledge as required B
121 55(4) Granting authorization to act as nuclear security officer for term exceeding five years or not subject to necessary terms and conditions B
122 55(5) Failure to provide copy of requested information or documents A
123 56(1) Acting as nuclear security support person without required authorization and any required escort B
124 56(2) Granting authorization to act as nuclear security support person without escort without meeting prescribed condition B
125 56(3) Granting authorization to act as nuclear security support person with escort without obtaining specified information and documents B
126 56(4) Failure to include required conditions in authorization to act as nuclear security support person B
127 56(5) Granting authorization to act as nuclear security support person without escort for term exceeding five years B
128 56(6) Granting authorization to as nuclear security support person not subject to necessary terms and conditions B
129 56(7) Failure to provide copy of requested information or documents A
130 57(1) Acting as central alarm station operator without written authorization of the licensee B
131 57(2) Granting authorization to act as central alarm station operator without meeting prescribed requirements B
132 57(3) Granting authorization to act as central alarm station operator for term exceeding five years or not subject to necessary terms and conditions B
133 57(4) Failure to provide copy of requested information or documents A
134 58(1) Failure to keep up-to-date list of each person granted a specified authorization and that identifies that authorization B
135 58(2) Failure to provide copy of record to Commission or inspector on request B
136 59(1)(a) Failure to revoke authorization of person who poses or could pose an unreasonable risk to health or safety of persons or security of the high-security site B
137 59(1)(b) Failure to revoke authorization of person who is no longer employed by or under contract to the licensee B
138 59(1)(c) Failure to revoke authorization of person whose duties or functions have been completed, suspended or otherwise terminated B
139 59(1)(d) Failure to revoke authorization of person who no longer requires it to perform their duties B
140 59(1)(e) Failure to revoke authorization of person who provided false or misleading information B
141 59(2) Failure to notify Commission in writing of revocation of authorization as required within prescribed time B
142 60 Failure to equip high-security site with devices that provide uninterrupted power supply for critical security measures B
143 61(1) Failure to enclose protected area with physical barrier at perimeter B
144 61(2) Failure to protect perimeter of protected area with required nuclear security measures or by keeping it under direct visual surveillance of nuclear security officer B
145 61(3) Failure to design and construct physical barrier and design and implement nuclear security measures such that they together provide sufficient time and reduce risk as required B
146 61(5)(a) Failure to construct means of entry or exit so that it can be closed and securely locked B
147 61(5)(b) Failure to keep means of entry or exit closed and securely locked except in specified circumstances B
148 62(1) Failure to have unobstructed area on both sides of physical barrier as required B
149 62(2) Failure to illuminate unobstructed area as required B
150 63 Failure to protect perimeter of protected area with required nuclear security measure B
151 64 Failure to establish process to identify vital areas and keep required record B
152 65(1)(a) Failure to protect vital area with nuclear security measures that are in addition to those used to protect the protected area B
153 65(1)(b) Failure to protect vital area with nuclear security measures that provide access control for the area B
154 65(1)(c) Failure to protect vital area with nuclear security measures that provide for detection of unauthorized access to the area B
155 65(1)(d) Failure to protect vital area with nuclear security measures that delay adversaries as required B
156 65(1)(e) Failure to protect vital area with nuclear security measures that triggers the specified alarm B
157 65(1)(f) Failure to protect vital area with nuclear security measures that are monitored as required B
158 65(2) Failure to securely lock means of entry or exit in vital area B
159 66 Failure to keep up-to-date list of persons as specified B
160 67(1) Failure to enclose inner area with structure as required B
161 67(2) Failure to keep means of entry or exit closed and securely locked with required device B
162 68(1) Failure to protect inner area with required nuclear security measures or by keeping it under direct visual surveillance of nuclear security officer B
163 68(2) Failure to protect inner area with required nuclear security measures B
164 69(1)(a) Permitting unauthorized person to enter or remain in protected area B
165 69(1)(b) Permitting unauthorized person to enter or remain in vital area C
166 69(1)(c) Permitting unauthorized person to enter or remain in inner area B
167 69(2) Permit person who requires escort to enter and remain in protected area or inner area without escort B
168 70 Failure to immediately report unauthorized person to nuclear security officer B
169 71(a) Failure to ensure that weapons are only taken into protected area or inner area in specified circumstances B
170 71(b) Failure to ensure that explosive substances are only taken into protected area or inner area in specified circumstances B
171 71(c) Failure to ensure that threat items are only taken into protected area or inner if they are necessary for an operational requirement B
172 72(1) Failure to ensure Category I, II or III nuclear material is only removed from protected area or inner area in accordance with licence B
173 72(2) Failure to ensure Category I, II or III nuclear material is only removed from vital area with authorization of licensee B
174 73(a) Taking weapon into protected area or inner area except in specified circumstances B
175 73(b) Taking explosive substance into protected area or inner area except in specified circumstances B
176 73(c) Taking threat items into protected area or inner area that are not necessary for an operational requirement B
177 73(d) Removing Category I, II or III nuclear material from protected area, vital area or inner area without authorization of licensee B
178 74 Failure to verify identity of person entering protected area as required C
179 75 Failure to verify and record identity of person entering vital area B
180 76 Permitting land vehicle to enter protected area, vital area or inner area without operational requirement B
181 77(1) Failure to ensure that land vehicles only enter or exit protected area through vehicle portal or opening as required C
182 77(2) Failure to ensure that both moveable barriers of vehicle portal or opening are not open at same time except in specified circumstances B
183 77(3) Failure to ensure that vehicle portal or opening is attended or protected as required when both moveable barriers are open at the same time B
184 78(1) Permitting means of entry or exit in structure enclosing inner area to be unlocked, opened or kept open longer than required B
185 78(2) Permitting means of entry or exit in structure enclosing inner area to be unlocked, opened or kept open without direct visual surveillance of nuclear security officer B
186 78(3) Permitting means of entry or exit in structure or barrier enclosing inner area to be unlocked by unauthorized persons B
187 79 Entering and remaining in inner area without being accompanied as required B
188 80(1) Failure to post required signage for high-security site B
189 80(2) Failure to post required signage for protected area or inner area A
190 81(1) Permitting person to enter protected area or inner area without having them and their possessions searched as required B
191 81(2) Failure to ensure that all persons and their possessions are searched as required when exiting protected area or inner area B
192 81(4) Permitting person to remain in protected area or inner area without having them and their possessions searched as required B
193 81(5) Failure to conduct search in accordance with requirements B
194 81(6) Failure to conduct search of land vehicle in vehicle portal as required B
195 82 Entering protected area or inner area after refusing search B
196 85(1) Granting facility-access security clearance without meeting prescribed conditions B
197 85(3) Granting facility-access security clearance for term exceeding 10 years or not subject to necessary terms and conditions B
198 85(4) Failure to keep record indicating how the status or clearance was verified A
199 86(1) Failure to keep an up-to-date list of persons granted facility-access security clearance A
200 86(2) Failure to provide copy of list of persons to Commission or inspector on request A
201 87(1)(a) Failure to revoke facility-access security clearance of person who poses or could pose an unreasonable risk to health or safety of persons or security of nuclear facility B
202 87(1)(b) Failure to revoke facility-access security clearance of person who is no longer employed by or under contract to licensee B
203 87(1)(c) Failure to revoke facility-access security clearance of person whose duties or functions have been completed, suspended or otherwise terminated B
204 87(1)(d) Failure to revoke facility-access security clearance of person who no longer requires it to carry out their duties B
205 87(1)(e) Failure to revoke facility-access security clearance of person who provided false or misleading information B
206 87(2) Failure to notify Commission in writing of revocation of facility-access security clearance as required within prescribed time A
207 88(1) Entering or remaining in nuclear facility without facility-access security clearance or required escort B
208 89(1) Failure to ensure that every person who enters or remains in nuclear facility is permitted to do so B
209 89(2) Failure to establish and implement process that controls access to the nuclear facility and ensures verification of the identity of persons entering it B
210 90(a) Failure to ensure that weapons are only taken into nuclear facility in specified circumstances B
211 90(b) Failure to ensure that explosive substances are only taken into nuclear facility in specified circumstances B
212 90(c) Failure to ensure that threat items are only taken into nuclear facility if they are necessary for an operational requirement B
213 91(a) Taking weapon into nuclear facility except in specified circumstances B
214 91(b) Taking explosive substance into nuclear facility except in specified circumstances B
215 91(c) Taking threat items into nuclear facility that are not necessary for an operational requirement B
216 91(d) Removing nuclear substance from nuclear facility without authorization of licensee B
217 92(1) Permitting a land vehicle to enter a nuclear facility without meeting prescribed conditions B
218 93 Failure to post required signage B
219 94(1) Failure to implement processes that provide for manner of selecting persons to be searched or screened B
220 94(2) Permitting person selected for search or screening to enter nuclear facility without required search or screening B
221 95 Failure to conduct search or screening as required B
222 96(1) Failure to conduct a security exercise testing the required elements at the specified interval B
223 96(2) Failure to notify Commission in writing of intent to conduct security exercise within prescribed time A
224 96(3) Failure to create record containing required information each time security exercise is conducted A
225 96(4) Failure to create corrective action plan setting out required information B
226 96(5) Failure to implement corrective actions as required B
227 96(6) Failure to provide copy of record and any corrective action plan to Commission within prescribed time A
228 101(1) Failure to conduct security exercise as required at the specified interval B
229 101(2) Failure to keep record containing the required information each time a security exercise is conducted B
230 101(3) Failure to create corrective action plan setting out required information B
231 101(4) Failure to implement corrective actions as required B
232 101(5) Failure to provide a copy of record and any corrective action plan to Commission within prescribed period A
Packaging and Transport of Nuclear Substances Regulations, 2015

105 Paragraph 6(1)(a) of the Packaging and Transport of Nuclear Substances Regulations, 2015 footnote 4 is replaced by the following:

106 Paragraph 7(b) of the Regulations is replaced by the following:

Transitional Provisions

Definition of former Regulations

107 (1) For the purposes of this section, former Regulations means the Nuclear Security Regulations as they read immediately before the day on which these Regulations come into force.

Words and expressions

(2) Unless the context otherwise requires, words and expressions used in this section have the same meaning as in section 1.

Nuclear facility

(3) The former Regulations and Part 9 of the schedule to Administrative Monetary Penalties Regulations (Canadian Nuclear Safety Commission), as they read immediately before the day on which these Regulations come into force, continue to apply for two years after that day to a nuclear facility for which, on the day on which these Regulations come into force, a licence issued under the Act is in force.

Existing authorization or clearance

(4) If a person has been granted a clearance or issued an authorization under the former Regulations, that clearance or authorization remains valid until the expiry of the term for which it was granted or issued, and during that term the person may continue to access any area or information and carry out any duties and responsibilities that the clearance or authorization permitted them to access or carry out under the former Regulations.

Site access security clearance

(5) If a person has been granted a site access security clearance under the former Regulations that is valid on the day on which these Regulations come into force and that, to maintain the person’s access to the nuclear facility, must be replaced by a facility-access security clearance granted under section 85, the licensee that granted the clearance may, before the term of the clearance expires, extend the term of the clearance to any term not exceeding 10 years.

Repeal

108 The Nuclear Security Regulations footnote 5 are repealed.

Coming into Force

Registration

109 These Regulations come into force on the day on which they are registered.

SCHEDULE

(Section 1)

Category I, II and III Nuclear Material
Item

Column 1

Nuclear Substance

Column 2

Form

Column 3

Quantity (Category I Nuclear Material)

Column 4

Quantity (Category II Nuclear Material) table b2 note 1

Column 5

Quantity (Category III Nuclear Material) table b2 note 1 table b2 note 5

1 Plutonium table b2 note 2 Unirradiated table b2 note 3 2 kg or more Less than 2 kg, but more than 500 g 500 g or less, but more than 15 g
2 Uranium 235 Unirradiated table b2 note 3  — uranium enriched to 20% 235U or more 5 kg or more Less than 5 kg, but more than 1 kg 1 kg or less, but more than 15 g
3 Uranium 235 Unirradiated table b2 note 3  — uranium enriched to 10% 235U or more, but less than 20% 235U N/A 10 kg or more Less than 10 kg, but more than 1 kg
4 Uranium 235 Unirradiated table b2 note 3  — uranium enriched above natural, but less than 10% 235U N/A N/A 10 kg or more
5 Uranium 233 Unirradiated table b2 note 3 2 kg or more Less than 2 kg, but more than 500 g 500 g or less, but more than 15 g
6 Fuel consisting of depleted or natural uranium, thorium or low-enriched fuel (less than 10% fissile content) table b2 note 4 Irradiated N/A More than 500 g of plutonium 500 g or less, but more than 15 g of plutonium

Table b2 note(s)

Table b2 note 1

The quantities listed refer to the aggregate of each kind of nuclear substance located at a facility, excluding the following (which are considered separate quantities):

  • (a) any quantity of the nuclear substance that is not within 1 000 m of another quantity of the nuclear substance; and
  • (b) any quantity of the nuclear substance that is located in a locked building or a similarly resistant structure.

Return to table b2 note 1 referrer

Table b2 note 2

All plutonium except that with isotopic concentration exceeding 80% in plutonium 238.

Return to table b2 note 2 referrer

Table b2 note 3

Material not irradiated in a reactor or material irradiated in a reactor but with a radiation level equal to or less than 1 Gy/h at 1 m unshielded.

Return to table b2 note 3 referrer

Table b2 note 4

Other fuel that by virtue of its original fissile content is classified as Category I nuclear material or Category II nuclear material before irradiation may be reduced one category level while the radiation level from the fuel exceeds 1 Gy/h at 1 m unshielded if the Commission is provided with written confirmation of the radiation level.

Return to table b2 note 4 referrer

Table b2 note 5

Quantities less than the quantities set out in column 5 for Category III nuclear material and any quantities of natural uranium, depleted uranium or thorium should be protected at least in accordance with the requirements of paragraphs 12(1)(c), (g), (h) and (j) of the General Nuclear Safety and Control Regulations.

Return to table b2 note 5 referrer

REGULATORY IMPACT ANALYSIS STATEMENT

(This statement is not part of the Regulations.)

Executive summary

Issues: Security threats, operational experience and technological advancements have evolved dramatically since the Nuclear Security Regulations (NSR) were implemented. Therefore, the NSR will be repealed and replaced in order for the Regulations to continue to meet their objectives. The NSR need to be modernized to align with current international recommendations, guidance and best practices and with current Government of Canada directives and policies to ensure that nuclear facilities in Canada continue to mitigate physical, cyber and insider threats in the modern and evolving threat and risk environment. Further, changing the NSR is necessary for the Canadian Nuclear Safety Commission (CNSC) to maintain a modern regulatory framework using science- and evidence-based, risk-informed and technically sound regulatory practices that consider scientific uncertainties and evolving expectations such as small modular reactor (SMR) deployment in Canada. This was reflected in the recommendations made in the SMR Roadmap and the SMR Action Plan to amend prescriptive requirements that pose a potential barrier to SMR development and deployment in Canada.

Description: The new Nuclear Security Regulations (the Regulations) will repeal and replace the NSR. The Regulations will implement a more performance-based approach to regulating nuclear security by enabling licensees and applicants to introduce new technologies, processes and procedures while meeting the same robust security objectives. They will also include new requirements for cyber security and the protection of sensitive information and update security clearance requirements to address new threats and risks. The Regulations will address and incorporate international peer-reviewed suggestions from International Atomic Energy Agency (IAEA) experts and will be aligned with international security recommendations, guidance and best practices. Further, the structure of the Regulations will be revised to improve their readability and clarity.

Rationale: The Regulations are a key regulatory instrument for the security of nuclear materials, nuclear facilities and nuclear substances in Canada. New security threats and risks, technologies and international recommendations, guidance and best practices must be accounted for in the CNSC’s nuclear security regulatory framework. In addition, the CNSC should move to performance-based regulations, where appropriate, in alignment with the Cabinet Directive on Regulation and the Policy on Regulatory Development, as well as the commitments made in the SMR Roadmap and SMR Action Plan.

The CNSC performed extensive public consultation for the Regulations. The CNSC posted several discussion papers for public consultation and held multiple information sessions with industry, members of the public and other federal and provincial government departments and organizations. The CNSC also hosted workshops with industry on the changes and to obtain information on monetized costs and benefits. The feedback received from all these sessions was used to inform the analysis and development of the Regulations. The regulatory development also determined that regulatory action was needed in the modern threat and risk environment. The significance of the changes and restructuring led the CNSC to determine that the repeal and replacement of the NSR will be the most appropriate action to take to achieve the CNSC’s policy objectives.

The Regulations will result in a present value cost of $141.3 million, with present value benefits of $221.5 million, yielding a net present value (benefit) of $80.2 million (all figures 2023 CAD). The largest monetized cost impact item was attributed to the updated requirements for vital area nuclear security measures, with a total present value cost of $76.6 million. Conversely, the largest monetized benefit primarily revolves around cost savings associated with a performance-based requirement that will allow regulated parties to determine their own security staffing ($196.8 million present value). The main benefit to Canadians from the NSR is in the form of the reduced health, safety and environmental threats and risks due to potential security incidents at nuclear facilities and/or involving nuclear substances. A detailed cost-benefit analysis (CBA) report is available upon request.

There will be no impacts on small businesses due to the Regulations.

The one-for-one rule applies, since there will be an incremental increase in administrative burden on business. The Regulations will introduce requirements that are considered to be incremental burden under the rule, and the proposal will repeal and replace an existing regulation with a new regulatory title, which results in no net increase or decrease in regulatory titles. The Regulations will result in an annualized administrative cost of $44,310.

The Regulations will improve alignment with international regulatory regimes and address findings from international reviews of Canada’s nuclear security regime.

Issues

The Nuclear Security Regulations (NSR) were substantially amended in 2006. Since then, security threats, operational experience and technological advancements have evolved dramatically. In addition, the NSR need to be modernized to align with current international recommendations, guidance and best practices. There are a number of issues and key drivers behind repealing and replacing the NSR.

The NSR are overly prescriptive

A number of provisions in the NSR require the same prescriptive level of security for all “high-security sites” (HSS). For example, the NSR establish specific requirements for security barriers. This prevents licensees and proponents from using new security technologies or innovative practices that meet or exceed the regulatory objective to delay or deter potential adversaries. In addition, this does not differentiate between large and small nuclear reactors and does not take into consideration a risk-informed approach to address potential security threats and risks or different technologies, sizes, locations and alternative approaches to preventing theft and sabotage.

Advancements and innovations in nuclear technology, as well as in technologies and methods for physical protection and cyber security, are expanding the range of measures and approaches through which licensees can design and operate their nuclear facilities to meet nuclear security regulatory requirements. Furthermore, these advancements and innovations offer opportunities for licensees and proponents to design nuclear facilities and/or implement concepts of operation that have the potential to effectively eliminate vulnerabilities licensees will otherwise have to consider in the design of the nuclear security systems of their respective facilities.

Evolving threat environment and cyber security threats

Potential threats to nuclear infrastructure have continued to evolve since the NSR were substantially amended last in 2006. One of the fastest-growing threats to critical infrastructure in Canada, including to nuclear facilities, are cyber attacks. Further, ransomware and other cybercrimes have become a persistent threat to organizations in Canada.footnote 6 The NSR do not include any provision for cyber security or for the protection of digital information. Another new threat is the use of unmanned aerial systems by potential adversaries, which present new security challenges for nuclear facilities, as they represent a new sophisticated and complex threat.footnote 7 The NSR do not contain provisions to address these new and evolving threats.

Additionally, there is concern globally that nuclear security overall has been stagnating or declining in recent years, and while nuclear security in Canada has remained strong, there are still identified areas of improvement, such as the use of unmanned aerial systems by potential adversaries, cyber security, insider threat protection and security culture.footnote 19

International recommendations, guidance and best practices

In October 2015, the International Physical Protection Advisory Service (IPPAS), created by the International Atomic Energy Agency (IAEA), conducted a mission to review the nuclear security regime and regulatory framework in Canada. The mission was performed by a team of international security experts who compared Canada’s practices to IAEA nuclear security recommendations and guidance as well as other relevant international instruments. The mission report contained 3 recommendationsfootnote 8 and 30 suggestionsfootnote 9 to enhance the nuclear security regime in Canada. Certain findings focused on improving CNSC’s nuclear security regulatory framework and suggested better alignment with important international nuclear security fundamental principles and recommendations (e.g. nuclear security culture, interface between nuclear material accountancy and control [NMAC] and nuclear security, protection of sensitive information in physical and digital media, and two-person rule in the central alarm station). The NSR do not contain explicit requirements for security culture, interface of safety, security and safeguards or the protection of sensitive information.

Changes to Government of Canada security clearance standards

The NSR reference the (ARCHIVED) Personnel Security Standard, published by the Treasury Board of Canada Secretariat (TBS) in 1994, as the standard for examining the trustworthiness and reliability of individuals that necessitate access to sensitive information and assets. The Standard was superseded by the (ARCHIVED) Standard on Security Screening in 2014 and by the Directive on Security Screening in 2025. The consequence of not updating the new security standard in the NSR may pose an unreasonable risk to the protection of sensitive information and assets and to nuclear facilities and nuclear substances. For example, the NSR do not prescribe financial inquiries (credit checks) for individuals with unescorted access to vital areas. These individuals may pose a security risk because of financial pressure or their history of poor financial responsibility. While the status of an individual’s financial situation may not affect their ability to do a job, financial obligations or pressures could pose a security risk.

Use of private security guards at nuclear facilities

There is considerable variation in training and licensing requirements across the country and a lack of oversight for the use of private security personnel. Some jurisdictions have no legislation, policy or guidelines on the use of private security. The inconsistency in regulatory practices raises concerns about the use of private security services at nuclear facilities. Several issues have been mentioned in the Public Safety Canada 2015 Study (PDF), such as the potential for criminal activity, the infiltration of private security by organized crime groups, the exploitation of security officers through low wages, and corruption in security guard training schemes. The lack of interfaces with provincial private security regulations is an area for improvement in the security regulatory framework. The NSR do not contain any baseline requirements on the training and qualifications for private security guards or “in-house” security personnel at nuclear facilities.

New federal government activities with respect to small modular reactors (SMR)

Small modular reactor (SMR) technology is an emerging technology that is an important component of Canada’s net-zero initiatives led by the Minister of Natural Resources in 2021 and in (ARCHIVED) Budget 2022. Without new SMR builds, nuclear power generation could be severely limited in its contribution to decarbonization initiatives. Amendments to improve the efficiency and clarity of requirements in the NSR were identified as a priority in Pillar 2: Policy, legislation and Regulation of the SMR Roadmap. Amendments will enable the removal of regulatory barriers to the development and deployment of new reactor designs and technologies, as the NSR do not provide for the application of a graded approach based on risk-informed criteria.

Other issues

Certain definitions in the NSR, such as the definitions for weapons, explosive substances and firearms, are not aligned with the Criminal Code definitions. Other definitions, such as sabotage and security monitoring room, are not aligned with the IAEA Nuclear Safety and Security Glossary (PDF). In addition, the current layout of the NSR can make it challenging to determine which requirements apply to nuclear material and which apply to a specific facility. For example, requirements that apply to Category III nuclear material are found in both Part 1 and Part 2 of the NSR. Further, Schedule 2 of the NSR contains a list of specific organizations, some of which have changed names or do not exist anymore. Overall, the approach to Schedule 2 in the NSR is outdated and does not include any specific types of nuclear facilities, and as a result, it cannot be applied to new applicants or other nuclear facilities.

Background

The Nuclear Safety and Control Act (the NSCA or the Act) establishes the CNSC’s authority to set regulatory requirements for all nuclear-related activities in Canada. Under the Act, the CNSC regulates the use of nuclear energy and materials to protect the health, safety and security of Canadians and the environment; to implement Canada’s international commitments on the peaceful use of nuclear energy; and to disseminate objective, scientific, technical and regulatory information to the public. A key part of the CNSC’s mission is to regulate the security of nuclear material, nuclear substances, nuclear facilities, prescribed equipment and prescribed information.

The NSR apply to nuclear facilities that process, use or store Category I, II or III nuclear material, including nuclear power plants, as set out in Schedule 1 of the NSR. They also apply to facilities such as nuclear fuel fabrication facilities and nuclear substance processing facilities listed under Schedule 2 of the NSR, as well as proponents of new nuclear facilities. The NSR are divided into two parts. Part 1 sets security-related requirements and general obligations for licence applications submitted in accordance with the NSCA. It also includes information about security requirements for HSS, as defined in the NSR. Part 2 provides security-related requirements for the licensing and operation of nuclear fuel and processing facilities that are listed in Schedule 2 of the NSR.

The last major revision of the NSR was completed in 2006. These amendments incorporated the results of domestic and international analysis and recommendations that were driven by the significant change to the security context following the terrorist attacks on the United States on September 11, 2001.

The review of the NSR was associated with significant federal government activities with respect to the Canadian SMR Roadmap Steering Committee.footnote 10 This steering committee identified, in its report titled A Call to Action: A Canadian Roadmap for Small Modular Reactors, that “the current regulations would require SMRs to incorporate security infrastructure comparable to today’s operating full-scale nuclear power plants.” One of the priority recommendations from that report was for the CNSC to revise the NSR to remove prescriptive requirements and instead focus on ensuring that consistent security outcomes and performance objectives are met. The SMR Roadmap also recommended that the NSR provide for the application of a graded approach based on risk-informed criteria. The follow-up to the SMR Roadmap, titled SMR Action Plan, was released in December 2020. It further underlined the importance of removing prescriptive requirements from the NSR as highlighted in action CNSC01 “Nuclear Security” and CNSC02 “Regulatory Efficiency.” As part of the SMR Action Plan, the Minister of Natural Resources detailed in the Message from the Minister the importance of SMR technology to Canada’s plan to achieve a net-zero economyfootnote 11 by 2050.

In Budget 2022 (PDF), the Government of Canada committed to supporting SMR development and deployment in Canada by providing $120.6 million over five years, starting in 2022–2023, and $0.5 million ongoing. This funding included

The Regulations will support the Government of Canada’s commitments related to SMR development and deployment.

Objective

The policy goals for repealing and replacing the NSR include

Description

The key elements of the Regulations are summarized below.

Moving towards a more performance-based approach

The Regulations will include performance-based requirements where practical. The performance-based requirements will include, but are not limited to, the application of traditional barriers/physical protection systems, the use of on-site and/or off-site armed response forces, the defence against design basis threat (DBT)footnote 12 sabotage events and the use of alternative measures such as engineered systems and novel concepts of operation, safety and security-by-design (SeBD) systems, or any combination thereof. The Regulations will establish the performance-based requirements and objectives, and these performance objectives will be applied to licensees and other affected stakeholders using a risk-informed approach, commensurate with the risk and complexity of the licensed activity. Implementing a more performance-based approach to regulating nuclear security will enable applicants and licensees to introduce new technologies, processes and procedures while meeting the same robust security objectives. The CNSC considers the level of risk of a facility or activity using the best available data and science in all regulatory activities, whether novel or conventional. This approach considers the level of risk to health, safety, security and the environment as the basis by which to establish regulatory requirements.

Inclusion of new requirements for threat and risk assessment

The Regulations will require nuclear facilities to

Inclusion of new requirements for cyber security and for the protection of sensitive information

The Regulations will require that nuclear facilities address the cyber security risks identified in their TRA as part of their cyber security program and protect relevant computer-based systems and components from those threats and risks.

In addition, the Regulations will require applicants and licensees to identify sensitive information in physical and/or digital form and to ensure the sensitive information is protected against the threats identified in the licensee’s TRA, throughout the lifecycle of the information. This new requirement will apply to computer-based systems and components used for processing, storing and transmitting sensitive information.

Better alignment with international recommendations, guidance and best practices

The Regulations will include new requirements to

Update for new security clearance screening standard

The Regulations will update the security screening standard for facility access clearance to include new requirements similar to those in the TBS Directive on Security Screening for site access status, site access clearance and enhanced security screening. In particular, credit checks will be required for individuals with enhanced site access clearance. In addition, the site access status and site access clearance validity will expand from 5 to 10 years to align with the Directive on Security Screening.

Use of private security services at nuclear facilities

Under the Regulations, licensees will be required to ensure that security guards (non-nuclear security officers) are equipped, qualified and trained to perform their assigned duties. Licensees will also be required to develop and maintain procedures and instructions for these security guards.

Introduce and revise definitions and terminology

The Regulations will update and clarify certain definitions. For example:

Simplified layout

The layout of the Regulations will be revised to enhance clarity and to reduce any repetition. The improvements that will be implemented include the following:

Consequential amendments

Consequential amendments will be made to the Class I Nuclear Facilities Regulations, Nuclear Substances and Radiation Devices Regulations and the Packaging and Transport of Nuclear Substances Regulations, 2015. This will ensure references to the Regulations will be accurate.

Administrative monetary penalties

The Regulations will also make amendments to Part 9 — Nuclear Security Regulations — of the schedule to the Administrative Monetary Penalty Regulations (Canadian Nuclear Safety Commission). This section has been updated to reflect the new structure of the Regulations and the new wording of the Regulations. The category of violations that will be established for the corresponding administrative monetary penalties (AMPs) is based on the existing category of violations for individuals and for persons other than an individual. The Administrative Monetary Penalty Regulations (Canadian Nuclear Safety Commission) will include the following new penalties:

The Regulations will adopt existing NSR AMPs and also improve the clarity and precision of the CNSC’s AMP framework, where each clause/provision will have its own corresponding AMP.

Information on the development, determination and impacts of the CNSC’s AMPs may be found in the CNSC’s discussion paper (ARCHIVED) DIS-12-05, Administrative Monetary Penalties, as well as in the impact analysis of the CNSC AMP Regulations. The CNSC also provides information on the use of AMPs as a compliance and enforcement tool in the regulatory document entitled REGDOC-3.5.2, Compliance and Enforcement: Administrative Monetary Penalties, Version 2.

Incorporation by reference

The Cabinet Directive on Regulation and the Policy on Regulatory Development encourage federal regulators to consider incorporation by reference as a tool to achieve regulatory outcomes. There are two documents that will be incorporated by reference in the Regulations: the Directive on Security Screening from the Treasury Board of Canada Secretariat and the Dangerous Quantities of Radioactive Material (D-Values) from the IAEA. Both of these documents are available online free of charge in both official languages and are well known and well understood by the CNSC and the regulated community.

The CNSC has reviewed these documents and determined they will meet the policy objectives of the Regulations. The CNSC will continue to monitor these documents to ensure the CNSC is aware of any revisions or changes to the documents. Should there be new/revised versions of the documents published, the CNSC will review them to ensure they continue to meet the policy objectives and will inform affected stakeholders of the publication of the new documents. Overall, the incorporated documents are updated infrequently; therefore, reviewing, assessing and communicating information to stakeholders will not pose a risk for licensees to comply with the Regulations.

Directive on Security Screening

The Regulations will incorporate the TBS Directive on Security Screening, as amended from time to time. The NSR referenced an earlier TBS standard, but that standard was superseded by the Directive on Security Screening. Site access clearances and enhanced site access clearances will be granted to personnel working at the nuclear facilities based on the criteria in this standard. The incorporation of this standard by reference will ensure that security clearances at nuclear facilities are issued based on the most up-to-date security screening standards. For more information, please refer to the “Changes to Government of Canada security clearance standards” subsection under the “Issues” section.

IAEA Dangerous Quantities of Radioactive Material (D-Values)

The NSR will incorporate by reference IAEA Dangerous Quantities of Radioactive Material (D-Values) as amended from time to time. Specifically, the CNSC will incorporate the data table containing the name of the radionuclide and the associated D-value (a numeric value). Incorporating this document by reference will align the Regulations with the most recent international scientific data on the health and safety risks of radionuclides. The incorporation of this document will address stakeholder concerns regarding security obligations for nuclear substances (other than nuclear material), as the D-values will provide the scientific criteria to determine what quantities and isotopes of nuclear substances will be subject to those requirements in the Regulations. The use of D-values was suggested by industry stakeholders during consultation. Refer to the section of the Regulatory Impact Analysis Statement (RIAS) regarding “Storage and Security of Nuclear Substances” for further discussion on those requirements.

Regulatory development

Consultation

Since 2016, the CNSC has undertaken significant and continuous consultation with stakeholders. Consultation workshops were held in 2016 and 2017 with nuclear industry stakeholders to obtain early input on potential improvements to the NSR based on new security technologies, new and evolving threats, new SMR possibilities and the industry’s operating experience with the NSR. In 2019, the CNSC co-hosted a workshop alongside the World Institute of Nuclear Security (WINS) for HSS representatives to explore modernization options for the security requirements for preventing potential sabotage events. Concurrently, the CNSC has been working with international counterparts to understand the evolving global security context and challenges. Moreover, informed by comments and input, the CNSC has been developing amendments, comparing options and making evidence-based decisions about the Regulations. In 2021, the CNSC embarked on broader consultation with all stakeholders regarding the Regulations. A detailed breakdown of the CNSC’s consultation for the Regulations is discussed below.

Early consultations (2016–2020)

The CNSC held three consultation workshops, in 2016 and 2017, with industry stakeholders to obtain preliminary input on potential amendments to the NSR. The industry stakeholders who attended the workshops were those directly responsible for implementing security measures at nuclear facilities or responsible for the security of nuclear material. The workshops included three different participant groups:

In December 2017, the CNSC released a stakeholder workshop report, which summarized the feedback received from the workshop participants. The CNSC also received feedback on the NSR through two discussion papers: in 2014, DIS-14-02, Modernizing the CNSC’s Regulations and in 2016, DIS-16-04, Small Modular Reactors: Regulatory Strategy, Approaches and Challenges. DIS-14-02 was posted on the CNSC website on November 17, 2014, for an initial 120-day consultation period, which was then extended to May 29, 2015, at the request of stakeholders. Following the consultation period, the comments received were posted for additional feedback from June to July 2015. DIS-16-04 was posted on the CNSC website for 120 days from May to September 2016, and the comments received were posted for additional feedback from November to December 2016. While comments received on DIS-14-02 were broad in nature and not specific to the NSR, they were noted and carried forward to the review of the NSR. Such comments raised issues of regulatory overlap, inconsistencies with international guidance, and using regulatory documents to set new requirements. However, comments on DIS-16-04 focused on the CNSC regulatory framework and how it could be clarified in some areas to enable a better understanding of how the CNSC’s licence application requirements might be applied to SMRs. A summary of the comments received from stakeholders, as well as the CNSC’s responses to those comments, was published in What We Heard Report – DIS-14-02 and in What We Heard Report – DIS-16-04, respectively.

2021 Consultation

In 2021, the CNSC issued two more discussion papers related to modernizing the nuclear security regulatory framework: DIS-21-02, Proposals to Amend the Nuclear Security Regulations and DIS-21-03, Cyber Security and the Protection of Digital Information. DIS-21-02, published for 90 days on the e-consultation platform Let’s Talk Nuclear Safetyfootnote 13 from April to July 2021, described the CNSC’s regulatory changes to areas of the NSR, such as physical protection (prevention of theft and sabotage), cyber security and the protection of nuclear security information, as well as security culture and the impact on NMAC. DIS-21-03, published for 90 days on Let’s Talk Nuclear Safety from July to October 2021, added more details on the revisions for regulating cyber security and the protection of digital information. From these two discussion papers, a total of 242 comments were received.

The CNSC hosted two information sessions with environmental non-governmental organizations (ENGOs) and members of the public on April 13, 2021, to inform participants about the regulatory amendment project, the past consultation and research that informed the CNSC’s proposals, as well as how to comment on the discussion papers and participate in stakeholder workshops following these information sessions. From April to September 2021, the CNSC held a series of consultation sessions with over 150 participants from the public, ENGOs, industry, Government of Canada departments and agencies, and representatives from various provincial governments. These sessions included a walkthrough of the regulatory amendment process, highlighted specific amendments to the NSR and presented the rationale behind the changes. Overall, in 2021, the CNSC received comments from 37 unique stakeholders, totalling over 500 comments. The CNSC summarized all stakeholder comments and the CNSC’s path forward on the NSR in the What We Heard Report: DIS-21-02 and DIS-21-03. Stakeholders supported most of the proposed amendments to the NSR that were discussed before the Canada Gazette, Part I (CG I), prepublication. Their principal concerns touched on the proposals for performance-based regulations, including those for protection against theft and sabotage, new cyber security and protection of sensitive information provisions, and the cost of performing security screenings. Additional details on these concerns are presented below.

Performance-based regulations

During the preconsultations, there was strong support from industry stakeholders for performance-based requirements with clear objectives, as well as for requirements that allow for alternative approaches to protect against theft and sabotage. However, industry stakeholders requested clarity on what the CNSC will consider sufficient in meeting nuclear safety objectives. Certain industry stakeholders emphasized that considerations ought to be different between large nuclear power plants and small nuclear facilities, where the latter have smaller inventories of nuclear materials. The public and ENGOs cautioned that the NSR must ensure that current levels of security are maintained or strengthened and that the application of nuclear security should be at the same level, regardless of the geographic location or technology used in that facility (e.g. urban versus remote locations).

In consideration of the concerns above, it should be noted that compliance with any performance-based requirement will be assessed by the CNSC. Applicants and licensees will be required to demonstrate that they have achieved the objectives or outcomes as set out in the Regulations. The Regulations will continue to support Canada’s robust nuclear security regime while affording licensees and applicants greater flexibility in demonstrating how they can meet nuclear security regulatory requirements. The CNSC will provide further guidance on how to meet performance-based requirements in the CNSC’s regulatory guidance documentsfootnote 14 (REGDOCs). In addition, the CNSC meets with licensees periodically to provide guidance.

Cyber security threats and cyber security in TRAs

Cyber security requirements are currently found in the licencefootnote 15 of each HSS. The CNSC requires HSS to follow the Canadian Standards Association (CSA) standard N290.7, Cyber security for nuclear facilitiesfootnote 16 and cites this standard as guidance for other nuclear facilities. Representatives from research reactors, SMRs and other nuclear substance processing facilities expressed the need for a risk-informed approach to requirements for cyber security. Although the research reactor licensees supported the risk-informed approach to cyber security, they also raised concerns regarding the use of the risk-informed approach, as they thought it was unclear how CSA N290.7 could be applied to lower-risk licensed activities.

Representatives from HSS voiced concerns over costs to implement the new 2021 version of the CSA N290.7 standard. However, it should be noted that these costs will be borne by the licensee regardless of the requirements in the Regulations, as the previous version of that standard is already a requirement for HSS through the licence conditions for those facilities.

Stakeholders from all groups — though most strongly from the SMR vendors and designers, the research reactors and fuel cycle licensees — questioned the need to submit revisions to the TRAs on an annual basis. The CNSC then clarified that the proposal will require that the TRAs be reviewed by the licensee every year but revised only if there is a change. There was general agreement among industry stakeholders to include cyber threats in the TRAs and to have requirements to protect against cyber threats, as some HSS were already doing this. Licensees from all groups and SMR vendors and designers, however, expressed a need for more guidance on how to assess cyber threats and how to integrate them into the TRAs.

Industry stakeholders recommended the use of a risk-informed approach to determine the systems that ensure or impact safety, security, emergency preparedness and safeguards that will be included in the licensee’s TRA. Industry stakeholders noted that the program elements set out in the CSA N290.7 standard are suitable in general, and certain industry stakeholders sought the use of the risk-informed approach, which will allow licensees of facilities with Category III nuclear material the flexibility to propose alternative methods, approaches and security measures. However, industry stakeholders also requested that the CNSC provide further guidance as to how the CSA N290.7 standard could be applied to these facilities.

The CNSC intends to provide guidance regarding TRAs and the application of the risk-informed approach for cyber security considerations in its REGDOCs.

Protection of sensitive information

Most licensees agreed with the CNSC’s lifecycle approach for the protection of sensitive information, though some expressed concerns about the increase in scope of information to be protected and found the definition of sensitive information to be overly broad. Most licensees already use risk-informed information classification schemes and generally agreed that classifying and marking information is necessary to adequately handle and protect information. However, some expressed concerns that the classification schemefootnote 17 will be difficult to align with their existing classification schemes and could potentially lead to over-classifying information and that implementing multiple sensitivity levels will be overly burdensome in achieving the regulatory objective.

The CNSC will clarify requirements and develop guidance on how to identify and protect sensitive information in its REGDOCs.

Security clearance screening standard

Industry stakeholders expressed concerns with expanding the need to conduct financial and security checks for all employees, as opposed to applying the standard based on the level of responsibility for individual roles. There were also concerns about the accessibility of technology used to conduct fingerprinting, as some have faced challenges with collecting employees’ fingerprints.

The CNSC recognizes that employers have experienced issues with fingerprinting due to COVID-19 restrictions and the lack of technology availability. As a result, the CNSC has changed the proposal to not require fingerprinting as part of the law enforcement inquiry (criminal record name check). Based on the feedback received during consultations, the proposal related to credit checks was also changed so that they will be mandatory only for individuals with an enhanced security site access clearance, based on a risk-informed approach.

Canada Gazette, Part I, prepublication

The Regulations were prepublished in the Canada Gazette, Part I, on November 12, 2022, followed by a 60-day comment period.

Overall, 16 submissions were received, totalling 107 unique comments, with 103 submitted by industry stakeholders and 4 comments from members of the public. The comments primarily focused on the impact of the Regulations on existing facilities, with a smaller focus on the impacts of the Regulations on potential future SMR development and deployment.

Concurrently with the CG I prepublication, a discussion paper entitled DIS-22-02, Proposals to Amend the REGDOC 2.12 Nuclear Security Series was posted on the CNSC’s e-consultation platform for public consultation. This discussion paper provided an opportunity to consult with stakeholders on the clarifications and guidance that will be included in the revised REGDOCs.

The main themes of stakeholder interest and concerns during the CG I consultation period included the following:

To clarify comments and further discuss concerns from industry stakeholders, CNSC staff held a workshop with industry stakeholders from March 22 to March 24, 2023, in Ottawa, Ontario. A Stakeholder Workshop Report summarizing the discussions and path forward was drafted and published on the CNSC’s e-consultation platform. A follow-up workshop with industry stakeholders to discuss revised policy proposals due to the feedback received was held on December 13, 2023. A discussion on the main themes of stakeholder interest and concern, as well as the amendments made to the Regulations between prepublishing in CG I and publishing in CG II, are presented below. A table summarizing the main changes is provided at the end of this section.

Critical security measures

Industry stakeholders had voiced concerns over the provisions requiring compensatory measures and uninterrupted power supplies for all security measures at nuclear facilities. Industry stakeholders stated that the potential scope of systems and components subject to these requirements was too broad and that it would be impractical and unnecessary to implement compensatory measures and uninterrupted power supplies for every security measure at their facilities. In addition, industry stakeholders stated that applying these provisions to degraded cyber security measures would be extremely burdensome and would not benefit the safety and security of nuclear facilities.

To address industry stakeholder concerns, the CNSC added a definition of “critical security measure” to the Regulations. With this definition, it is clear which security measures are considered critical and must meet the requirements for compensatory measures and uninterrupted power supplies. Applicants and licensees will be required to identify the critical security measures in the TRA and then put in place appropriate compensation measures in the event that a system/component loses power or otherwise becomes inoperable. This amendment and new definition were shared with the regulated industry during the December 2023 workshop, and the industry was overall supportive of the proposed change.

Cyber security and protection of sensitive information

Industry stakeholders expressed concerns about the proposal to prescribe that all nuclear facilities ensure all functions related to safety, security, emergency preparedness and response and safeguards provide protection against cyber security threats. Industry stakeholders raised the concern that compliance with that requirement would not be relevant, applicable or practical to consider for all facilities. For example, certain facilities subject to the Regulations, but with lower-risk profiles, do not carry out emergency preparedness or safeguard functions and, as a result, there would be no practical way (or added benefit) of protecting those functions from cyber security threats.

To address stakeholder comments, the CNSC has removed those specific functions from the Regulations and revised the requirements such that the Regulations will require licensees to protect the computer systems and electronic components of the nuclear facility against cyber security threats, as identified in the TRA. As a result, the revised requirement focuses on the outcomes for cyber security programs. The previous list of functions will be included in the revised REGDOCs, which will provide additional guidance on cyber security provisions to protect those functions at relevant facilities as part of a licensee’s overall cyber security program. Industry stakeholders were consulted about this change and voiced their support.

Regarding the requirements for the protection of sensitive information, the main point of concern for industry stakeholders was ensuring the protection of all information that could potentially meet the definition of sensitive information. In the absence of context, they found this unclear and overly broad, and suggested that this could result in unnecessary costs to protect a large amount and variety of information. After evaluating industry stakeholder feedback, the CNSC has revised the requirements such that the Regulations will require the licensee to use the TRA for that facility to determine what constitutes sensitive information within the context of that facility and associated activities. Subsequently, all sensitive information will be required to be protected from the threats and risks identified in the TRA. This will reduce the broad scope of information, as it will scope the definition of sensitive information by tying it to the TRA. Guidance on identifying, classifying and protecting sensitive information will be provided in the revised REGDOCs and can also be found in international standards and guidance documents.

Storage and security of nuclear substances

Industry stakeholders raised concerns that the proposed requirements for the storage of nuclear substances were too prescriptive and would have significant cost and operational impacts. Industry stakeholders were also concerned that the requirements to use equipment to detect unauthorized removal of nuclear substances would not be effective in detecting certain substances and preventing removal. In addition, concerns were raised that proposed requirements for direct surveillance would be cost prohibitive.

Industry stakeholders suggested that administrative or process controls would be more effective to store and prevent the unauthorized removal of nuclear substances. Industry stakeholders further expressed that the NSR should be more flexible to allow licensees to propose their own approaches to securely store nuclear substances based on the risk profile of their specific inventories. Industry stakeholders also expressed that there was a need for quantitative criteria to determine the type and quantity of nuclear substances that would be subject to these requirements.

To address stakeholder feedback regarding the storage and unauthorized removal of nuclear substances, the CNSC revised this provision to give more flexibility to the licensee regarding how to achieve the desired outcomes with respect to detecting, delaying and responding. The provisions were revised, and the Regulations will require licensees to implement nuclear security measures that will detect unauthorized access to nuclear substances in storage and provide sufficient delay to respond and prevent the unauthorized removal of those nuclear substances. This approach aligns with international best practices using factors of detection, delay and response for the security of nuclear facilities.

To address concerns around the requirement for direct surveillance of nuclear substances, the CNSC has adopted industry stakeholders’ suggestion to use the D-valuesfootnote 18 (the dangerous quantities of radioactive material) published by the IAEA as a way of determining the type and quantity of nuclear substances that must be protected. The Regulations will use D-values to identify the nuclear substances and their respective quantities that will be subject to these requirements for storage and direct surveillance. The CNSC determined that incorporation by reference of the data values/data tables of this IAEA document will be an effective means of identifying the quantities of nuclear substances subject to these requirements in the Regulations. As a result, this use of incorporation by reference addresses the CG I comments from stakeholders in this regard. Further information on the use of incorporation by reference in the Regulations is provided in the “Incorporation by reference” section of this RIAS.

Protected area nuclear security measures

Industry stakeholders raised concerns that the requirements for two barriers (one external barrier and one internal barrier) surrounding the protected area of an HSS were too prescriptive and implementation would have significant operational and cost impacts on several HSS. In addition, industry stakeholders suggested that the requirements for two barriers surrounding the protected area would impact and complicate potential expansions to existing facilities due to the space that the additional barrier would require. Industry stakeholders recommended making these requirements performance-based, which would allow applicants and licensees to assess how many barriers and nuclear security measures are needed for each facility based on the threats and risks relevant to each facility.

The CNSC decided not to prescribe the use of internal and external barriers for protected areas. The Regulations were updated after their publication in CG I to require one barrier and at least two additional nuclear security measures for the protected area. The barrier and nuclear security measures must be able to detect intrusions (or attempted intrusions) and any tampering of the security measures, trigger a continuous alarm, facilitate immediate assessment of the alarm, and provide sufficient delay time against unauthorized access to the protected area. This delay time is to allow for an appropriate response from on-site and/or off-site personnel, as necessary. This provision focuses on, and aligns with, international best practices on the main factors of detection, delay and response for the security of nuclear facilities. The revised REGDOCs will provide additional guidance on appropriate protected area security measures as well as delay time/intruder path analysis calculations to facilitate the delay and response times for each facility.

Searches, access control and authorizations

Industry stakeholders requested clarification on several provisions related to the following:

The CNSC has revised these provisions in the Regulations to provide clear expectations and requirements for nuclear facilities. The overall revisions include clarifying the requirements for signage and searches of nuclear material and nuclear substances at HSS and non-HSS so that the inventory of nuclear material/substances at those facilities is taken into consideration. Further, the CNSC revised the requirements for people with escorted access (i.e. visitors) to require one piece of identification to better accommodate visitors and delivery drivers. Industry stakeholders expressed support for these changes at a December 2023 workshop with the CNSC.

In addition, the CNSC will clarify in the supporting REGDOCs that the term “written authorization” would include authorizations issued electronically. Therefore, there would not be a burdensome requirement to write out the authorizations for each individual.

Design basis threat

The CNSC did not propose any changes to the requirements regarding DBT in the Regulations. However, the CNSC received several comments on DBT provisions from industry stakeholders, who voiced two main concerns:

While these comments did not result in any changes to the Regulations, they are being considered as part of the process to review and update the DBT, which is a separate and independent process, as the DBT is not a statutory instrument. The CNSC will consult with impacted licensees on the revised DBT as needed in this process and will inform HSS licensees of the revised DBT once completed, as required in the Regulations.

Vital area identification (radiological consequences)

Industry stakeholders expressed concerns that the definition of a “vital area” was unclear, particularly given the use of the term “unreasonable risk.” Industry stated that the lack of clarity in the definition would impact their ability to identify vital areas, as required in the Regulations, as they do not have a means to know what radiation dose or radiation release limits would constitute an “unreasonable risk.” Industry stakeholders suggested revising the definition of “vital area” to use the concept of radiological consequences instead of “unreasonable risk.”

Industry stakeholders suggested that the use of radiological consequences, defined in terms of quantitative radiation dose limits, would establish clear, measurable metrics for determining what constitutes a vital area of an HSS. As a result, any area in the nuclear facility with the potential to result in a dose over the limit/threshold would be considered a vital area. This approach would be consistent with IAEA recommendations and practices and with the policies of other nuclear regulators internationally.

In addition, industry stakeholders detailed that utilizing “radiological consequences” would ensure risk factors were considered when establishing thresholds and SeBD measures in the overall facility design for new facilities.

To address stakeholder concerns and clarify the requirements for vital area identification, the CNSC has revised the definitions of “sabotage,” “effective intervention” and “vital area” to introduce the concept of radiological consequences and connect those definitions to measurable dose limits. In turn, this will allow nuclear facility designers and operators to use these thresholds as acceptable metrics for identifying vital areas (and the requisite nuclear security measures) and protecting nuclear facilities and members of the public from radiological releases. The radiological consequence thresholds, the methodologies for determining radiological consequences at a nuclear facility, and the methodologies for identifying vital areas will be included in the revised REGDOCs. Similar information is also available in IAEA documentation.

Vital area nuclear security measures

Industry stakeholders expressed concerns about the requirements for means of entry/access control for the vital area and the requirements for intrusion/tampering detection for vital areas. Stakeholders suggested that these requirements would necessitate additional detection and assessment equipment/systems but would not provide a significant increase in the level of safety and security at the facility. Further, industry stakeholders stated that these requirements were highly prescriptive and, overall, would have significant operational and cost impacts on existing facilities and potential new SMR builds.

The CNSC considered the industry comments from CG I and concerns raised at a workshop in March 2023. Based on the feedback, the CNSC concluded that these requirements, as written, were prescriptive and would have unintended consequences for HSS. The CNSC determined that these provisions should be outcome-based focusing on the desired outcome for nuclear facilities to implement and maintain an additional layer of security for vital areas (in addition to the protected area nuclear security measures), which is aligned with the international (IAEA) best practices for vital area protection.

Responding to industry stakeholder concerns, the CNSC has amended the Regulations to require that licensees put measures in place that will deter, detect, delay and respond to theft and sabotage events in alignment with IAEA practices. The requirements state that licensees must adopt provisions for access control, detection of unauthorized access, delay of adversary entry, activation of alarms in the central alarm station in the event of unauthorized access, and detection/assessment of instances of tampering of nuclear security measures. This revised approach will provide an outcome-based, technology-neutral approach to vital area security. HSS licenses will not be required to implement specific security measures; instead, they will need to develop their own means to achieve the outcomes/functions required by the Regulations.

Secondary alarm stations

Industry stakeholders voiced strong concerns about the proposed requirement for a secondary alarm station (SAS). Industry stakeholders stated the construction of a separate SAS was not practical at certain facilities due to space considerations or decommissioning plans. Industry stakeholders also raised concerns about the cost burden this requirement would place on potential new SMR facilities.

To address stakeholder concerns, the requirements for SAS were revised to clearly state that licensees are required to have a form of backup station/measure/function independent of the central alarm station and that the backup/contingency measures must be performance tested. In addition, the term “secondary alarm station” was changed to “backup alarm station” to align with IAEA terminology.

Transportation security provisions

Members of the public provided comments related to the transportation security provisions of the Regulations. The commenters voiced their concern that it was not clear if the proposed requirements could ensure adequate detection and delay of and response to threats to Category I, II and III nuclear materials in transit. In addition, commenters inquired about how the CNSC would perform compliance verification and enforcement activities of the transportation security provisions.

To address stakeholder feedback, the CNSC revised the transportation security provisions to require that transportation security plans include a description of the conveyance and escort arrangement (risk-informed based on the category of nuclear material). The CNSC will verify compliance with the transportation provisions of the Regulations via reviews of documentation submitted by applicants and licensees (such as an application for a licence to transport), inspections of transportation activities and monitoring of transportation security exercises. The CNSC has also included, later in this RIAS, additional information on the implementation, compliance and enforcement strategies for the Regulations.

Further guidance on transportation security provisions and transportation security exercises will be provided in the revised REGDOCs.

Non-HSS facilities do not have Category I or II nuclear materials, and most non-HSS do not have Category III nuclear materials and, therefore, will not be impacted by this provision.

Coming-into-force provisions

Industry stakeholders representing HSS licensees raised concerns about the one-year transition period for those facilities to comply with the Regulations, as detailed in the transitional provisions. Industry stakeholders suggested that one year would not be sufficient time to perform the modifications to certain nuclear security measures (such as for vital areas, backup alarm stations and storage/surveillance of nuclear substances) necessary to comply with the requirements in the Regulations. To address this, the transitional provisions have been amended: the Regulations will include a two-year transitional period for both HSS and non-HSS facilities. Licensees were consulted on the revised transitional provisions during the December 2023 workshop and were supportive of the additional time that will be provided to come into compliance with the Regulations.

Summary of changes from CG I to CG II

The table below summarizes the main changes to the Regulations from the CG I prepublication to the CG II publication.

Item no.

Theme

Summary of major revisions

1

Critical security measures

Introduced a definition of "critical security measures" to provide the scope of the measures subject to requirements for compensatory measures and for the uninterrupted power supply.

2

Cyber security and the protection of sensitive information

Removed specific lists of functions that were subject to cyber security measures and revised the requirements to focus on the outcome of defending against cyber threats identified in the TRA.

Clarified the scope of information subject to the provisions for the protection of sensitive information, by linking it to the TRA.

3

Storage and security of nuclear substances

CNSC revised requirements to be outcome-based (less prescriptive).

Licensees will implement nuclear security measures that will detect unauthorized access to nuclear substances in storage and provide sufficient delay to respond to and prevent the unauthorized removal of those nuclear substances.

Introduced the concept of D-values from the IAEA to determine the scope of nuclear substances subject to this requirement.

4

Protected area nuclear security measures

CNSC revised requirements to be outcome-based (less prescriptive).

Revised the requirement for two barriers (internal and external barrier) to state that a barrier, in combination with other nuclear security measures, must provide for the appropriate detection, delay, and alarm assessment provisions, based on the licensee’s security case.

5

Searches, access control and authorizations

Clarified the provisions for searches and signage to better account for the inventory of nuclear substances.

Revised escort requirements to better accommodate visitors.

Removed requirements for "written authorizations."

6

Radiological consequences

Introduced a radiological consequence-based approach to identifying and protecting vital areas.

7

Vital area nuclear security measures

Revised requirements to be outcome-based (less prescriptive).

Revised requirements for licensees to adopt provisions for access control, detection of unauthorized access, delay of adversary entry, activation of alarms in the central alarm station in the event of unauthorized access, and detection/assessment of instances of tampering of nuclear security measures.

8

Secondary alarm stations

Revised requirement to have an independent backup alarm station that performs the functions of the central alarm station.

Changed the terminology from "secondary alarm station" to "backup alarm station" to align with terminology used internationally.

9

Transport security

Added requirements that the transport security plan must include a description of the conveyance and the escort arrangements during transport.

10

Coming-into-force timelines

Revised coming-into-force timeline for HSS from one year to two years. The implementation timeline for non-HSS remains unchanged at two years.

Indigenous engagement, consultation and modern treaty obligations

Due to the security-specific nature of this regulatory proposal to repeal and replace the NSR, the CNSC did not expect an impact on Indigenous and/or treaty rights. Nonetheless, to support engagement with Indigenous Nations and communities, the CNSC reached out in 2021 regarding the aforementioned discussion papers and workshops to all Indigenous communities that have nuclear facilities in their traditional or treaty territory or those who have expressed an interest. The CNSC offered to engage, discuss and receive comments about the proposed regulations. The Indigenous Nations and communities contacted by the CNSC did not indicate a need for or interest in further consultations.

The initial assessment of modern treaty obligations examined the geographical scope and subject matter of the initiative in relation to modern treaties in effect and did not identify any potential modern treaty implications. Although no clear linkages or impacts on modern treaty partners have been identified as a result of the Regulations, Crown-Indigenous Relations and Northern Affairs Canada (CIRNAC) recommended that modern treaty partners be included in the CNSC’s engagement strategy, where there is the potential for nuclear projects. CIRNAC provided a list of modern treaty partners to reach out to, which includes the regions of the Northwest Territories, Nunavut, Yukon, Labrador and Northern Quebec. The CNSC contacted modern treaty partners in these regions with information on the Regulations and offered to provide more information should there be interest.

Following the CG I prepublication, the CNSC reached out again to Indigenous partners and communities that have nuclear facilities in their traditional or treaty territory, or that expressed an interest in nuclear facilities and/or nuclear facility regulations, to inform them that the Regulations were publicly available for review and comment. The CNSC held question-and-answer sessions with two Indigenous communities and organizations and received written submissions from four Indigenous Nations and communities on the Regulations and/or the REGDOC discussion paper (DIS-22-02). Topics of feedback/discussion included providing more information and clarity on new provisions for cyber security and sensitive information, questions related to the transition to performance-based regulations, requests for clarification on REGDOC content, and discussions on the overall regulation-making process. Following these submissions/sessions, the CNSC contacted the Indigenous communities and organizations on potential follow-up activities. No further consultation/engagement requests were received.

The CNSC is committed to engaging with any Indigenous Nation or community that expresses interest regarding the CNSC’s regulatory framework. For additional information on the CNSC’s commitment to Indigenous engagement and consultation, refer to CNSC REGDOC-3.2.2, Indigenous Engagement and to its web page on Indigenous consultation and engagement.

Instrument choice

After considering the following non-regulatory options, the CNSC determined that repealing and replacing the NSR was the most effective and appropriate instrument.

1. Status quo

The option of maintaining the status quo was considered but rejected.

The threats and risks faced by nuclear facilities in Canada have changed significantly since the NSR entered into force and were last amended in 2006. New technologies and measures to protect nuclear facilities, nuclear materials and nuclear substances have also been developed since that time. The risk to Canadians and the environment continues to increase over time, as past threats faced by Canadian nuclear facilities evolve, and new countermeasures, counter technologies or other security measures are not able to be properly considered and deployed.

SMR technology is an emerging technology that is an important component of Canada’s net-zero initiatives by the Minister of Natural Resources in 2021 and in (ARCHIVED) Budget 2022. Without new SMRs, nuclear power generation could be severely limited in its contribution to decarbonization initiatives. Amendments to improve the efficiency and clarity of the prescriptive requirements in the NSR were identified as a priority in Pillar 2: Policy, legislation, and regulation of the SMR Roadmap. A need to amend the NSR was identified in the SMR Roadmap recommendation 22, with the resulting commitment from the CNSC to amend the NSR captured in actions CNSC01 and CNSC02 of the SMR Action Plan.

2. Licence conditions

The idea of adding the new security requirements to individual licences as licence conditions was considered but ultimately rejected. Since most of the requirements are common to all nuclear facilities or at least a subset of facilities (i.e. HSS), rather than repeating the same requirements in each and every licence as licence conditions, the CNSC determined that it would be more effective to capture these as a minimum set of generic requirements in regulation. However, the CNSC recognizes that licence conditions can be an effective way of prescribing certain requirements, including facility-specific requirements, when needed.

3. Voluntary compliance

The CNSC also looked at the possibility of a voluntary compliance regime; however, this option was rejected, as it would not be possible to ensure consistent minimum standards. Voluntary compliance, whether through the use of the CNSC’s regulatory guidance documents (REGDOCs) or via other programs by licensees, implies that there is some discretion on the part of the licensee with respect to the implementation of nuclear security measures. This could potentially leave Canadian nuclear facilities vulnerable to physical and/or cyber threats. Voluntary compliance includes the possibility of licensees applying differing security measures or standards in terms of the level of security, which could lead to inconsistencies in how security threats and risks are addressed across licensees. Voluntary compliance would not provide the Canadian public or the international community with the assurance that adequate nuclear security protection measures have been taken to address threats to Canadian nuclear facilities, nuclear materials and nuclear substances.

Regulatory analysis

Benefits and costs

The total present value cost for the Regulations is expected to be $141.3 million, with the total present value of the benefits being $221.5 million. This results in a net present value (benefit) of $80.2 million for the Regulations (2023 CAD). The majority of present value costs for the Regulations are related to vital area nuclear security measures ($76.6 million), cyber security and information security provisions ($24.5 million), and provisions for backup central alarm stations ($14.5 million). These costs are primarily related to existing facilities and were adjusted based on industry stakeholder estimates concerning the new requirements outlined in CG I.

The Regulations will enhance safety and security around nuclear sites and reduce the risk of catastrophic incidents that could damage the health of Canadians or the environment, or cause economic damages due to power outages. Since incidents and accidents at nuclear sites are extremely rare, the reduction in risk cannot be quantified. There are also qualitative benefits due to the Regulations associated with the reduced risk of nuclear security incidents. The benefits that are monetized are primarily related to cost-saving from performance-based security staff requirements ($196.8 million) for future SMR development and deployment, and not from existing facilities.

A detailed CBA report for the Regulations can be obtained by contacting the CNSC. Contact information is provided at the end of this RIAS.

Summary of changes between the Canada Gazette, Part I, and the Canada Gazette, Part II

There are differences in the CBA between what was posted in the RIAS for CG I and this version. The main reasons for changes in monetized costs include the following:

The main driver for the differences in monetized benefits between CG I and CG II are due to the increased projections for nuclear power plants. Climate change, energy security and electrification/decarbonization initiatives have led to a substantial increase in interest in nuclear energy from 2022 to present. Federally, at the COP28 meeting in 2023, Canada was one of the countries pledging to triple nuclear power by 2050.footnote 23 The Canada Energy Regulator, in its Energy Futures 2023 report, outlined the importance of new nuclear facilities (among other non-emitting sources of electricity) in Canada’s efforts and worldwide efforts to reach net-zero by 2050.footnote 24

Further, at the provincial level, four provinces (Ontario, New Brunswick, Alberta and Saskatchewan) developed and published a strategic plan in 2022 for the development of SMRs in their respective provinces.footnote 25

The main monetized benefits from the Regulations are expected to result from cost savings for new nuclear facilities due to the implementation of performance-based regulations. The aforementioned reports and projections published from 2022 to 2024 outline a significant increase in potential new nuclear facilities from the projections that were available when the CG I RIAS was developed. Thus, when the most recent projections are used, the number of new facilities is increased, and therefore the monetized benefits (cost savings) increase significantly.

Cost-benefit analysis methodology

The CBA for the Regulations compared the incremental impacts between a baseline scenario and a regulatory scenario according to the Policy on Cost-Benefit Analysis. The baseline scenario shows the costs and benefits expected without the Regulations, as described in the status quo option in the “Instrument choice” section. The regulatory scenario describes the expected incremental impacts of the Regulations.

Monetized impacts are calculated using the Standard Cost Model (PDF) [SCM] from the Organization for Economic Co-operation and Development (OECD). This is an internationally recognized methodology for determining and calculating the monetized effects of government regulation on business. For this CBA, the SCM was used to calculate both the compliance costs and the administrative burden costs for the Regulations.

The Regulations will impact 5 HSS licensees, covering 13 sites, as well as 8 Class IAfootnote 37 and Class IBfootnote 38 licensees, covering 11 sites, which include research reactors, nuclear fuel fabrication facilities and nuclear substances processing facilities, which are non-HSS. Further, three organizations that transport nuclear material will be impacted to a more limited extent by the requirements for transportation security exercises.

During the initial development of the Regulations, there were no SMRs in operation or under construction in Canada. However, there are now several potential SMR projects that may be realized over the 12-year period of analysis. In support of this, four organizations with interest in SMR technologies (Ontario Power Generation, Bruce Power, New Brunswick Power and Canadian Nuclear Laboratories) provided monetized estimates of costs and benefits associated with the regulatory amendments in relation to proposed SMR facilities.

The data used in this CBA were obtained via consultation with stakeholders. When needed, remaining data for labour costs were obtained from Statistics Canada.footnote 39

The CNSC identified certain elements of licensee operations that will be affected by the Regulations, including

Present value totals are in 2023 CAD, with a present value base year of 2025 (when the regulations are registered and published) using a rate of 7% over a 12-year time period (2025–2036). This provides for a present value base year of 2025 and covers costs of industry and government over the period of 2025–2027 to come into compliance with the Regulations. It also considers impact for 10 years from the implementation date of the Regulations (2027) and aligns with the criteria in the Policy on Cost-Benefit Analysis and the associated Requirements for developing, managing and reviewing regulations. Discount rates of 0%, 3%, 5% and 10% were considered as part of the sensitivity analysis for the NSR.

Consultation on the cost-benefit analysis

The CNSC hosted workshops with affected stakeholders to determine the operational impacts (costs and benefits) of the various elements of the Regulations. The CNSC took an iterative approach to these workshops and conducted the workshops in multiple phases:

These workshops included representatives from HSS, SMR proponents and non-HSS. Industry representatives submitted their preliminary monetization data in advance, which was later discussed at the September workshop. Following the workshop, industry revised the monetization data based on CNSC feedback and submitted the revised data. This revised data was reviewed by the CNSC and compared with internal cost information where available (i.e. contracts for TRAs, costs for security clearances and equipment costs related to cyber security) to obtain the final monetization data. Further outreach and discussions with impacted licensees took place in July and August 2024 regarding the costs and benefits of the substantive changes developed after the CG I prepublication.

The qualitative benefits were determined based on information from CNSC subject matter experts and benchmarking against international recommendations and best practices. The CNSC further discussed the qualitative benefits of the Regulations with industry stakeholders during the March 2023 commenters meeting and December 2023 industry discussions, and the industry stakeholders came to a better understating of the rationale and benefits of repealing and replacing the NSR.

Costs

The estimated total incremental present value cost of the Regulations will be $141.3 million. Costs are grouped according to the main themes of the amendments that will impose cost impacts on regulated parties. These themes are as follows:

Overall, the majority of the capital costs will be incurred between 2025 and 2027, as licensees prepare to be in compliance by the 2027 coming-into-force date. From 2027 onward, the labour costs are expected to be the main factor, as these are costs incurred every year as part of the operation and maintenance costs for the facility.

The monetized impacts of these themes (except for CNSC compliance activities) will be in the form of changes to licensees’ internal processes/programs/procedures, the purchase/upgrade and maintenance/repair of structures and/or equipment (hardware and/or software), and labour costs for staff performing the new duties required in the Regulations.

Costs for CNSC compliance activities are attributed to industry due to the CNSC being a cost-recovery organization under the Canadian Nuclear Safety Commission Cost Recovery Fees Regulations. Therefore, the costs incurred by the CNSC from compliance activities (e.g. inspections and desktop reviews) are billed back to the licensees. To verify compliance with the Regulations, the CNSC will perform more inspections and reviews of security programs and measures and thus charge more cost recovery fees to the regulated community.

The Canada Energy Regulator’s (CER) report entitled Canada’s Energy Future 2023 (PDF) indicated that the first year for SMR operation will be 2030. Thus, costs and benefits related to SMRs will be expected in the period of 2030–2036.

Benefits

The primary benefit to Canadians from the Regulations will be the reduction in risk of nuclear security incidents that will be derived from enhanced nuclear security. This reduction in risk cannot be quantified in a practical fashion and is treated qualitatively.

In addition, the prevention of damages to nuclear facilities that cause radioactive releases (from physical, cyber or insider threats) and the prevention of the theft of nuclear materials and nuclear substances will result in reduced health and safety risks to Canadians and the environment.

There will also be the reduced risk of economic damage due to power outages, such as lost revenue for power generating utilities, recovery costs related to nuclear security incidents, increased electricity costs and possible electricity or radioisotope shortages should certain nuclear facilities be offline for an extended period due to a security incident.

A further benefit will be economic benefits due to the provisions to allow for SeBD and off-site response forces as part of a nuclear facilities nuclear security system, as well as the implementation of a radiological consequence-based approach to determining sabotage targets at HSS.

Further discussions and examples of these benefits are provided in this RIAS and in the detailed CBA report.

Security events related to nuclear facilities

One of the main benefits to Canadians from the Regulations will be reduced risk of security events at nuclear facilities. These security events include both physical security and cyber security events, as well as threats from external adversaries and internal adversaries (insider threats). The types of nuclear security incidents targeted in the Regulations are rare in Canada and globally. However, when incidents do occur, their impacts are significant and far-reaching. Examples of incidents for both cyber security/information protection and for physical security, as well as information on the specific threats and risks from insider threats, are presented below, with additional examples and information included in the CBA report.

Cyber security and protection of sensitive information

Physical security (sabotage and theft)

Several notable sabotage and theft incidents have occurred at nuclear facilities.footnote 44

Insider threats

Insider threat is a growing concern in the nuclear sectorfootnote 45 and one of the most challenging threats to HSS.footnote 46 Historically, almost all incidents of theft of nuclear material and sabotage of nuclear facilities have been committed or aided by insiders.footnote 47 In Canada, insider threats have been identified as a major risk to Canada’s national securityfootnote 48 and in 2022, Public Safety Canada published a report regarding recommended security actions to protect critical infrastructure from insider threats.footnote 49

Security-by-design, off-site responses and radiological consequences

The Regulations will provide for applicants and licensees to include SeBD and/or off-site response forces as part of their nuclear security measures and their overall nuclear security system at the nuclear facilities. This will include utilizing SeBD and/or off-site response forces to perform an effective intervention against theft or sabotage of nuclear material and nuclear substances. The primary benefit of SeBD is aimed at advanced reactors/new builds, which could reduce the overall capital costs and operational costs of new reactor facilities, increasing the economic viability of new nuclear facilities. Further, utilizing SeBD could increase the overall security of a nuclear facility and enhance the integration of safety, security and safeguards at a facility, allowing for the optimization of these important concepts. As with SeBD, the use of off-site responders is seen as a strong contender to alleviate the security costs at nuclear facilities due to large contingents of on-site personnel and to make new/existing facilities more economically viable. Therefore, facilities that utilize SeBD and/or off-site response forces as part of their response/security provisions may see significant security improvements and significant cost savings/economic benefits.footnote 50

The introduction of radiological consequences will address industry comments on the need to clarify the definition and the identification processes for vital areas at HSS and will apply a risk-informed approach to the identification of vital areas and with respect to effective interventions. The main benefit of using radiological consequences as a measure for identifying vital areas and for determining the most appropriate nuclear security measure for preventing an incident is that it will provide a scientific standard for new and existing HSS. Further, this standard will be risk-informed to ensure the appropriate nuclear security measures are in place at each facility based on the risk profile of that facility. The inclusion of radiological consequences will also provide for the use of SeBD to reduce or prevent radiological releases. Overall, the implementation of radiological consequences could lead to a reduced number of vital areas at HSS and therefore lead to reduced costs in terms of nuclear security measures and response personnel.

Additional information and discussion of the benefits of SeBD, off-site response forces and the implementation of a consequence-based approach is provided in the CBA report.

Monetized benefits

The present-value monetized benefits for the Regulations will be $221.5 million. The monetized benefits of the Regulations will primarily stem from cost savings associated with allowing regulated parties to determine their own security (response force) staffing ($196.8 million present value) and security systems ($16.8 million present value) to prevent the unauthorized removal of nuclear substances or sensitive information from malicious actors, including potential insider threats. The changes to the validity period of site access clearance, from 5 years to 10 years, will result in a cost savings of $7.9 million present value.

The cost savings for the performance-based provisions were calculated as follows.

Projections for future SMR deployments for this CBA were based on the central scenario from the data provided as part of the CER’s report entitled Canada’s Energy Future 2023 (PDF). This report projected SMR deployment to begin in 2030 and then accelerate from the mid-2030s up through 2050. In general, SMRs are considered to have a capacity of up to 300 megawatts electric (MWe).footnote 51 Certain proposed designs of SMR, such as the BWRX-300footnote 52 that was selected by OPG and is under consideration by SaskPower, are of the 300 MWe capacity. For this calculation, it is assumed that each 300 MWe of projected capacity would result in one SMR.

To determine capital cost reductions, data on the costs of security systems/structures were found in the published literature. These costs ranged from US$1.00 to US$6.00 per kilowatt electric (kWe),footnote 53,footnote 54,footnote 55 with a central case of US$4.00/kWe (Can$5.40) used in the CBA. Potential savings for system/structure costs were found via a published case study from Sandia National Laboratories.footnote 56,footnote 57 This study investigated the potential for cost savings for SeBD for security system costs for advanced reactors, using a 300 MWe SMR as a text case. This study found that SeBD considerations could reduce the capital costs of the system by approximately 40%. Thus, this reduction by a factor of 40% was applied to the central case to find savings due to SeBD of structures/systems of Can$2.16/kWe. Applying the new cost to a 300 MWe SMR leads to an (undiscounted) savings of $972,000 per SMR. Afterwards, the cost reduction per SMR is multiplied by the projected number of SMRs to reach the total cost reductions (monetized benefits) for SeBD for performance-based requirements for security systems. These monetized benefits would represent one-time (up front) cost savings.

The monetized benefits for cost savings for security staff due to performance-based regulations utilized the same projections for the number of new SMRs as detailed above. As detailed earlier in this RIAS, the provisions for SeBD and off-site response forces in the Regulations will provide for reductions in security staff at HSS, and specifically staff who make up the on-site nuclear response force (NRF). To calculate those cost savings, the hourly wage values and number of positions that were reduced were required. The hourly wage values for nuclear security officers (NSOs) who comprise the NRF was found to be from $50 to $54, with 10% vacation pay and additional benefits.footnote 58 The CBA considered a central case of $52.00/hour, and after applying the 10% vacation pay and the standard 25% overhead for internal employees based on the Standard Cost Model (PDF), the overall cost per full-time equivalent (FTE) per year was $143,000. As these positions are staffed continuously, each position requires approximately 5 FTEs. Consultation with industry stakeholders on the CBA before the CG I prepublication indicated that an SMR facility that utilizes SeBD and off-site response forces could reduce overall positions by 5, which would mean an overall decrease of 25 FTEs. At cost per FTE of $143,000, this entails a reduction in operating costs of approximately $3,575,000 million per SMR. These monetized benefits would represent annual (ongoing) cost savings.

There are four underlying assumptions made when using these data. First, it was assumed that only SMRs were built in the CER report; therefore, no large scale (e.g. 1 000 MWe scale) reactor facilities were considered. The second assumption was that each SMR would be an individual facility (assumed no multi-unit facilities), thus no sharing of security systems or staff between reactor units located at the same facility. In both of those cases, it is likely there would be certain economic advantages, and the monetized benefits of the Regulations may be lower. The third assumption was that the published data for nuclear security systems was reflective of modern nuclear facilities. The published data on reactor facility costs often does not reflect increased security system/structure costs due to upgrades after the 9/11 terrorist attacks.footnote 59 Existing costs estimates for reactor facilities are largely based on case studies in the United States and France from large reactor build-outs in the 1970s and 1980s.footnote 60 However, there have been relatively few new reactors built in North America since the 9/11 attacks; thus, there is not a significant amount of published data on the most recent security system/structure costs. Due to this, the monetized benefits (cost savings) are likely understated. Lastly, it was assumed that the monetized benefits for the performance-based requirements would only result in cost savings for new facilities, but not existing facilities. As one of the main drivers for the Regulations is to transition to performance-based requirements to facilitate SMR development, SMRs and new facilities are the focus of the monetized benefits from these regulatory changes.

The monetized benefits related to the amended provisions for site access clearance were calculated using the same methodology as in the CBA for the CG I prepublication.

Refer to the CBA report for additional information and additional scenarios as part of the sensitivity analysis.

Overall, the enhanced deployment of SMRs will lead to long-term cost savings (net benefits) due to the performance-based regulations, based on certain projections for SMR deployment (refer to the sensitivity analysis for more information). Irrespective of potential SMR deployments, the monetized impacts may show a net cost for the Regulations. However, the benefits are expected to outweigh the quantitative costs if all the benefits could reasonably be quantified.

Impacts of the consequential amendments

There will be no monetized impacts from the proposed consequential amendments due to the Regulations. The consequential amendments to the Class I Nuclear Facilities Regulations, the Nuclear Substances and Radiation Devices Regulations and the Packaging and Transport of Nuclear Substances Regulations, 2015 would only amend references in those regulations for the corresponding section numbers in the Regulations.

Administrative monetary penalties (AMPs)

The amendments to the Administrative Monetary Penalties Regulations (Canadian Nuclear Safety Commission) also amend the references in these regulations to the proposed section numbers in the Regulations. There would be several new administrative monetary penalties (AMPs) added due to the proposed new requirements in the Regulations (such as for cyber security). However, these proposed new AMPs would be handled via the regular processes and procedures already implemented by licensees and by the CNSC. Relevant staff at nuclear facilities and CNSC staff (such as site inspectors) would require additional training on the Regulations, and the new AMPs would be included as part of that training. However, it is expected that the costs for such training would be minimal.

Overall, the use of AMPs benefits the Canadian public by allowing the CNSC to enforce requirements using an administrative process rather than resorting to prosecution in the courts. Judicial proceedings often result in considerable costs to the federal government and to the individual and/or corporation involved and may be too harsh a tool to utilize except in extreme circumstances.

Cost-benefit statement
Table 1: Monetized benefits (millions)
Impacted stakeholder Description of benefit 2025 2030 2036 Total (PV) Annualized value
Industry Performance-based requirements (security staff) $0.00 $2.55 $52.40 $196.83 $24.78
Performance-based requirements (security systems) $0.00 $0.69 $3.54 $16.82 $2.12
Security clearance validity period $0.00 $0.87 $0.58 $7.91 $1.00
All stakeholders Total benefits $0.00 $4.11 $56.52 $221.55 $27.89
Table 2: Monetized costs (millions)
Impacted stakeholder Description of cost 2025 2030 2036 Total (PV) Annualized value
Industry Vital area nuclear security measures $21.00 $3.13 $1.14 $76.62 $9.65
Cyber security and information protection $2.88 $2.06 $1.37 $24.50 $3.09
Central alarm station (backup) $1.50 $1.14 $1.08 $14.48 $1.82
Central alarm station (two-person rule) $0.00 $0.14 $1.51 $6.16 $0.78
Nuclear substance security and monitoring $0.75 $0.54 $0.36 $6.40 $0.81
CNSC compliance activities $0.00 $0.26 $0.66 $4.08 $0.51
Security exercises $0.00 $0.20 $0.33 $2.52 $0.32
Security culture $0.00 $0.08 $0.30 $1.57 $0.20
Safety, security and safeguards interface $0.00 $0.07 $0.27 $1.44 $0.18
Security guard qualification and training $0.00 $0.07 $0.27 $1.38 $0.17
Security clearances $0.00 $0.11 $0.13 $1.22 $0.15
Threat and risk assessments $0.07 $0.05 $0.03 $0.62 $0.08
Government (CNSC) Implementation activities $0.075 $0.0035 $0.0025 $0.29 $0.036
All stakeholders Total costs $26.29 $7.86 $7.46 $141.28 $17.79
Table 3: Summary of monetized costs and benefits (millions)
Impacts 2025 2030 2036 Total (PV) Annualized value
Total benefits $0.00 $4.11 $56.52 $221.55 $27.89
Total costs $26.21 $7.85 $7.45 $141.3 $17.79
NET IMPACT ($26.29) ($3.74) $49.06 $80.29 $10.11
Sensitivity analysis

The central case for the CBA used the central scenario for projected SMR growth from the CER Canada’s Energy Future 2023 using the associated published data.footnote 61 The central scenario was the “Net-Zero World” scenario. There were two other main scenarios, the “Net-Zero Canada” scenario (highest SMR growth) and the “Current/Baseline” scenario, which reflects the lowest SMR growth (0–1 SMR) as if the current baseline remained into the future. These two scenarios were considered as a component of the sensitivity analysis. In addition, the two Net-Zero scenarios each contained a sub-scenario of lowered SMR growth due to high costs. These five scenarios (including the central scenario) were considered as a component of the sensitivity analysis.

From the results, it was seen that using the highest-growth SMR projections yielded a net present value (NPV) of $240.6 million, mainly due to the cost savings of the performance-based regulations over a larger deployment of SMRs. Conversely, if few to no SMRs are deployed, as in the low case, then the NPV results in a net negative of $101.1 million. In this scenario, there would be no new facilities to take advantage of economic benefits from the performance-based regulations; therefore, there are few monetized benefits from the Regulations. However, it should be noted that regardless of the projects from SMR deployment, the qualitative benefits would outweigh the quantitative costs if they could be quantified practically.

Table 4: Net present value (NPV) results from small modular reactor projections (SMR)
NPV — High SMR scenario NPV — High SMR scenario (low SMR sub-scenario) NPV — Central case NPV — Central case (Low SMR sub-scenario) NPV— low SMR/baseline
$240.6 million $119.6 million $80.29 million $13.8 million $101.1 million

The NPV and annualized averages are sensitive to changes in the discount rate. This is due to two factors: the back-loaded monetized benefits for new reactor facilities and the front-loaded capital costs for requirements, such as vital area security measures. For the benefits, the largest source of monetized benefits (cost savings) is due to the performance-based requirements for new reactor facilities, which are expected to start in 2030 and slowly accelerate from there. Thus, the large majority of the monetized benefits are in the later years of the 10-year time frame, making the benefits susceptible to variations in the discount rates. In terms of costs, the majority of the costs are related to capital costs of vital area security measures and backup central alarm stations, which would be incurred in the first five years of the Regulations and would not be sensitive to the discount rate.

Although there is a large variance in NPV based on the change in discount rates, all of the modelled discount rates result in a positive NPV and annualized average.

Table 5: Net present value (NPV) results from discount rate sensitivity analysis
Discount rate (%) NPV (in millions of dollars) Annualized averages (in millions of dollars)
0.0 $222.4 $18.5
3.0 $148.3 $14.9
5.0 $110.7 $12.5
7.0 (central scenario) $80.29 $10.1
10.0 $45.1 $6.6

The complete sensitivity analysis is found in the CBA report.

Distributional analysis

The new requirements in the Regulations for TRAs, security exercises and nuclear substance monitoring will be applied to non-HSS, while those provisions already apply to HSS in the NSR. While cyber security is not an explicit requirement in the NSR, all HSS have implemented the standard CSA N290.7, Cyber security for nuclear power plants and small reactor facilities as per the requirements of the licence conditions for those facilities.footnote 62 However, non-HSS had not implemented the requirements of that standard under the NSR. Thus, several of the new provisions in the Regulations will have a proportionately higher impact on the non-HSS when compared to HSS, as shown in the table below.footnote 63

Table 6: Breakdown of the costs per stakeholder group (in millions of dollars)
Stakeholder group Net present value (NPV)costs Annualized averages
Multi-unit nuclear power plant (HSS) $90.75 $11.43
Single-unit power plants and Canadian nuclear laboratory (CNL) facilities (HSS) $21.97 $2.77
Small modular reactors (SMR)/advanced reactors $18.01 $2.27
Class IB nuclear substance processing facilities (non-HSS) $5.10 $0.64
Fuel fabrication facilities (non-HSS) $4.07 $0.51
Research reactors (Academic institutions) (non-HSS) $1.01 $0.13
Transport organizations $0.06 $0.01
Government (CNSC) $0.29 $0.036
TOTAL $141.26 $17.80

As seen in the table above, multi-unit nuclear power plants will see the greatest overall monetized cost increases, mainly due to the requirements for vital area security measures, upgraded cyber security, the protection of sensitive information provisions and provisions for backup central alarm stations. Non-HSS will see costs spread over more items than HSS, due to the aforementioned new requirements related to threat and risk assessments, private security guards,footnote 64 security exercises and nuclear substance monitoring for those facilities. However, the total cost per facility will be much lower for non-HSS than HSS. Nevertheless, non-HSS will also see a large monetized benefit from the changes to the security screening requirements. There will not be a requirement for the enhanced (5-year) site access clearances, since all personnel at non-HSS will transition to a 10-year security screening validity.

In terms of monetized benefits for performance-based regulations, SMRs/new reactors will experience significant benefits (cost savings) due to the provisions related to SeBD, off-site response forces and radiological consequences. Overall, these provisions will comprise the large majority of monetized benefits.

The complete distributional analysis for the NSR is found in the CBA report.

Small business lens

Analysis under the small business lens concluded that the Regulations will not impact Canadian small businesses.

One-for-one rule

The Regulations will repeal an existing regulatory title (the NSR) and replace it with a new regulatory title of the same name. The Regulations will impose a new administrative burden on applicants and licensees to demonstrate compliance with the new regulatory requirements, such as cyber security and the protection of information for all licensees, and new TRAs and security exercises for non-HSS licensees. The administrative burden related to the Regulations will encompass reporting/submitting information/documentation to the CNSC to demonstrate compliance, notifying the CNSC for certain activities (e.g. security exercises), meeting with internal/external stakeholders, copying/filing information, such as for new TRAs, and assisting CNSC with compliance verification activities, such as inspections.

Overall, the annualized administrative cost is estimated at $44,310 (2012 Canadian dollars, a 7% discount rate and a 2012 present value base year), and the annualized administrative costs per business is found to be $3,382.

Administrative burden was discussed and considered during the cost-benefit workshops with licensees from June to October 2021, and industry stakeholders included their estimates of administrative burden in their submissions to the CNSC. The CNSC reviewed these submissions and provided additional guidance and clarification to licensees on the specific costs for which the administrative burden applies, as defined by the Red Tape Reduction Act and as calculated per the Red Tape Reduction Regulations. Licensees revised their submissions related to administrative burden, which later informed the administrative burden calculations performed by the CNSC.

Regulatory cooperation and alignment

The Regulations are not related to a work plan or commitment under a formal regulatory cooperation forum.

Alignment with international regulatory regimes

Several of the objectives of the Regulations are to align the Regulations with international requirements and best practices. These include entry into force of the Amendment to the Convention on the Physical Protection of Nuclear Material (CPPNM);

The Regulations will reflect the current security requirements in the IAEA CPPNM and will align with international standards. The CPPNM established measures related to the prevention, detection and punishment of offences pertaining to nuclear material. It is the only international legally binding convention related to the physical protection of nuclear material, and was signed by Canada on March 3, 1980.

The Amendment to the CPPNM came into force on May 8, 2016. This increased the scope of the CPPNM to encompass physical protection requirements for nuclear facilities and nuclear material in domestic use, storage and transportation. It expanded upon the scope of offences identified in the CPPNM (e.g. the theft of nuclear material) and also introduced new offences, such as smuggling nuclear material and sabotaging nuclear facilities. As part of the Amendment, states, including Canada, are required to prevent and combat offences and to minimize the radiological consequences of sabotage. The Regulations will ensure that Canada continues to fulfill its international obligations for the security of nuclear and radioactive materials.

Canada will be addressing several recommendations and suggestions from the 2015 IPPAS report in the Regulations. In total, five amendments are directly linked to the IPPAS mission findings to (1) improve nuclear security culture; (2) improve the protection of sensitive information; (3) enhance the interface between safeguards, security and safety; (4) conduct transportation security drills and exercises at nuclear facilities; and (5) implement the two-person rule in the Central Alarm Station. In addition, the Regulations will address the suggestions from the 2019 IRRS peer review mission to strengthen safety and security interfaces.

Assessment of aligned jurisdictions

The CNSC undertook an assessment of similarly capable and aligned jurisdictions with the broad objective of identifying areas of commonality and alignment. It was identified that several other countries have implemented or are in the process of implementing performance-based/outcome-based regulations for their nuclear security regulatory regime. In addition, these states have implemented or are in the process of implementing provisions, such as off-site alarm stations, off-site response forces and radiological consequence-based approaches. Country-specific information is provided below:

The U.S. Nuclear Regulatory Commission (USNRC) is proposing to revise its regulatory framework to take a performance-based, risk-informed technology neutral approach to regulating nuclear power plants in the U.S., as per recent U.S. federal legislation.footnote 65 In addition, the USNRC approved a new rule, in 2024, to modernize nuclear security in the U.S., such as removing requirements for the minimum amount of on-site response personnel. The rule allows for the use of off-site response forces and off-site secondary/backup alarm stations, which ensures that revised requirements for physical barriers permit engineered safety functions (SeBD) or other alternative measures.footnote 66 In addition, the USNRC has committed to reviewing radiological consequence-based regulations in the future.

The United Kingdom (U.K.) completed a transition of its nuclear security regime from a prescriptive framework to an outcome-based (performance-based) framework in 2022.footnote 67 This included a transition to a radiological consequence-based approach for the prevention of sabotage.

France has maintained a performance-based approach to nuclear facilities, and the flexibility of that regime has meant that the framework did not need to be updated frequently in order to mitigate new risks or technologies.footnote 68

Overall, the CNSC nuclear security framework will be aligned with recent nuclear security modernization initiatives in other countries. The CNSC recognizes the importance of regulatory cooperation and will continue to engage with similarly capable and politically aligned jurisdictions.

Coordination with orders of government

Although nuclear security is within the federal domain, the CNSC has engaged relevant provincial partners in order to gather feedback and perspectives on the impact of the regulatory changes on the implementation of provincial public safety regulations. The Regulations will not put any requirements on the provincial public safety regulations but will continue to require licensees to have a relationship and agreements, as necessary, with the provincial and territorial governments.

The CNSC held a workshop with provincial government departments and agencies on June 23, 2021, to inform them of the CNSC’s regulatory proposals and obtain feedback. In total, three provincial government organizations attended this workshop. The provincial government departments did not express any concerns regarding the proposal.

Effects on the environment

In accordance with the Cabinet Directive on Strategic Environmental and Economic Assessment, a preliminary scan concluded that a strategic environmental and economic assessment is not required.

Although an environmental and economic assessment is not required, it should be noted that the Regulations will likely result in some qualitative environmental benefits. Nuclear energy in Canada contributes to climate change and other emission reduction objectives, as nuclear energy will displace significant amounts of greenhouse gases when compared to fossil fuel power plants, such as natural gas.footnote 69 Nuclear energy has a role in future electrification and decarbonization initiatives and is expected to aid in meeting Canada’s net-zero objectives while also meeting growing electricity demand.footnote 70 Further, Canada’s pledge to triple nuclear power by 2050 recognizes the importance of current and future nuclear power generation for the world to realize its climate change and greenhouse gas emission reduction goals.

As an example, the restart of two reactor units at the Bruce Nuclear Generating Station contributed, in 2014, to the phaseout of coal power in Ontario.footnote 71

Gender-based analysis plus

The CNSC has conducted a gender-based analysis plus (GBA+) review of the Regulations and determined that differential impacts on the basis of identity factors, such as gender, race, sexuality and religion are unlikely. Gender demographics within the nuclear security sector are not expected to be influenced by the Regulations, and CNSC staff assess that the Regulations will neither exacerbate nor reinforce existing gender disparities in the industry.

The roles and responsibilities covered under the Regulations are based on qualifications, competencies and security requirements, which will not differentiate on the basis of gender or other identity factors. Therefore, the regulatory requirements will apply equally to all individuals, regardless of gender or other intersecting identity characteristics. The objective of the Regulations remains centred on enhancing security measures without introducing or perpetuating any inequality within the workforce.

Overall, the Regulations are designed to strengthen nuclear security while ensuring fairness, inclusivity and equal opportunity for all individuals, regardless of gender or other intersecting identity factors.

Implementation, compliance and enforcement, and service standards

Implementation

The Regulations will come into force on the day upon which they are registered, with the exception of the requirements for existing HSS and non-HSS, which will come into force two years following the registration of the Regulations.

Licensees have been kept informed of the regulatory development process and expected timelines to help them plan for implementation. The CNSC will work with licensees to coordinate the implementation of the Regulations. One such example is the Nuclear Security Advisory Group (NUSAG). This group was formed in 2023 and consists of the CNSC and licensees. The group meets quarterly to discuss topics of importance to nuclear security, which include implementation, compliance and enforcement considerations in preparation for the coming into force of the Regulations.

At the time that the Regulations are published in the CG II, the CNSC will inform all relevant licensees of that publication. CNSC communications will also inform stakeholders of the publication via social media and email lists. Additional compliance promotion and outreach activities will be carried out through existing quarterly meetings with HSS licensees.

New applicants (proponents of licence applications for new facilities) will need to comply with the Regulations once the Regulations are registered and published in the CG II. Should a licence be issued for a new facility, the accepted licence application will form the basis for the nuclear security compliance program at that facility.

Implications for other jurisdictions (domestic and international)

The CNSC has consulted with relevant provincial and federal police forces regarding response arrangements for nuclear security events at HSS and non-HSS, as well as for transportation applications. Police responses are important to ensure effective interventions against DBT threats or any threats identified in the licensee’s Threat and Risk Assessment. The CNSC continues to maintain communication and regular consultations with relevant police forces. Those police forces also participate in security exercises, and the NSR includes a requirement to ensure that adequate coordination, communication and collaboration are established to respond to a nuclear security event. The CNSC has developed regulatory guidance in the supporting REGDOCs regarding response arrangements with police forces and will verify those agreements during inspections and performance testing exercises.

Fund sources

The CNSC is a cost recovery organization. Therefore, costs related to compliance verification activities, such as inspections, will be cost recovered as per the Canadian Nuclear Safety Commission Cost Recovery Fees Regulations. The cost impacts due to cost recovery were considered in the CBA for the Regulations.

Guidance, technical documents and enforcement plans

CNSC staff will be reviewing and updating internal guidance, work instructions and templates to align with the changes in the Regulations and the associated REGDOCs.

Supporting REGDOCs will be posted for public consultation following publication in the CG II in 2025 in order to provide an opportunity for the industry, Indigenous Nations and communities, as well as members of the public to provide further feedback and comments on the REGDOCs. Following the consultation period, the draft REGDOCs will be revised to address stakeholder feedback and brought to the CNSC for acceptance for publication.

Compliance and enforcement

The CNSC’s graduated approach to enforcement encourages and compels compliance while deterring future non-compliance. When non-compliance (or continued non-compliance) has been identified, CNSC staff assess the significance of the non-compliance and determine the appropriate enforcement action based on the CNSC’s graduated approach to enforcement. Each enforcement action is a discrete and independent response to non-compliance.

To ensure licensees remain in compliance with the provisions of the regulators, CNSC inspectors regularly verify that licensees are complying with the NSCA and its regulations and will perform inspections of the relevant facilities and activities in accordance with the powers of inspectors under section 32 of the Nuclear Safety and Control Act. These will include, but will not be limited to, field inspections of facilities, Type I and Type II inspections of processes, and inspections of licensee submissions, such as threat and risk assessments, security plans and other documentation (refer to CNSC REGDOC-3.6, Glossary of CNSC Terminology for definitions), as well as assessments of security drills and exercises.

Non-compliance with the requirements of the Regulations will be subject to CNSC regulatory oversight. Licensees will need to develop and submit a corrective action plan, and the CNSC will monitor the status of those actions to ensure their completion. When necessary, the CNSC will take enforcement actions (including, but not limited to, AMPs) using a graduated approach to enforcement to encourage and compel compliance and deter future non-compliance. Further information is provided in CNSC documentation, available on the CNSC webpage titled “The CNSC’s approach to compliance verification and enforcement.”

Contact

Sarah Graham
Acting Director
Regulatory Framework Division
Canadian Nuclear Safety Commission
280 Slater Street
P.O. Box 1046, Station B
Ottawa, Ontario
K1P 5S9
Email: Consultation@cnsc-ccsn.gc.ca